Evolutionary cryptography theory-based generating method for secure ECs

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards generating secure keys for braid cryptography

Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. The security of this system is based upon the conjugacy problem in braid groups. Since then, there have been several attempts to break the braid cryptosystem by solving the conjugacy problem in braid groups. In this paper, we first survey all the major attacks on the braid cryptosystem and conclude that the ...

متن کامل

Foundations for Actively Secure Card-based Cryptography

Card-based cryptography allows to do secure multiparty computation in simple and elegant ways, using only a deck of playing cards, as first proposed by den Boer (EUROCRYPT 1989). Many protocols as of yet come with an “honest-but-curious” disclaimer. However, a central goal of modern cryptography is to provide security also in the presence of malicious attackers. At the few places where authors ...

متن کامل

Provably Secure Policy-Based Cryptography

The concept of policy-based cryptography (PBC) is a promising paradigm for trust establishment and authorization in large-scale open environments. A policy-based encryption scheme (PBE) allows to encrypt a message according to a policy so that only entities fulfilling the policy are able to perform the decryption of the message. Symmetrically, a policy-based signature scheme (PBS) assures that ...

متن کامل

Secure Key Issuing in ID-based Cryptography

ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent drawback of key escrow problem, i.e. users’ private keys are known to the key generation center (KGC). Therefore secure key issuing (SKI) is an important issue in ID-based cryptography. In multiple authority approach (Boneh & Franklin 2001, Chen et al. 2002), key generati...

متن کامل

Unconditionally Secure Cryptosystem Based on Quantum Cryptography

Most cryptographic works these days have employed mathematical concepts to design cryptosystems and algorithms. Therefore, mathematical concepts have become critical in the designing of cryptosystems, and are generally used to analyze cryptosystems and protocols, supporting the allegation that the intended cryptosystem is secure. In earlier cryptosystems, most algorithms were based on either fa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tsinghua Science and Technology

سال: 2017

ISSN: 1007-0214

DOI: 10.23919/tst.2017.8030539