Joint Operation in Public Key Cryptography
نویسندگان
چکیده
منابع مشابه
Joint operation in public key cryptography
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the main reason why in this paper we present a...
متن کاملPublic-Key Cryptography with Joint and Related-Key Security
The principle of key separation dictates using different keys for different cryptographic operations. We investigate the topic of joint security, where a single keypair is used in multiple primitives in a secure manner. We concentrate mainly on the case of encryption and signature under a shared keypair, giving a generic construction and a more efficient direct construction, both secure in the ...
متن کاملCryptography. key exchange, public key
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...
متن کامل2 Public-key Cryptography
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996). The message that is sent by the sender is called the plain...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2013
ISSN: 2158-107X,2156-5570
DOI: 10.14569/ijacsa.2013.040320