نتایج جستجو برای: passive key generation center attack
تعداد نتایج: 1271168 فیلتر نتایج به سال:
Needs for providing security to end users have brought installation of quantum key distribution (QKD) in one-to-many access networks such as passive optical networks. In the networks, a presence of optical power splitters makes issues for secure key rate more important. However, researches for QKD in access networks have mainly focused on implementation issues rather than protocol development f...
Interaction of Intrahippocampal Injection of Naltheroxone and Corticosterone on Consolidation and Retreival Memory Processes in Passive Avoidance Task in Rat AA. Vafaei [1] , A. Rashidy-Pour [2] Received: 15/01/08 Sent for Revision: 01/07/08 Received Revised Manuscript: 15/09/08 Accepted: 20/10/08 Background and Objectives Previous studies suggested that the role of corticostero...
Addition of carboxylic acid dianions appears to be a potential alternative to the use of aluminium enolates for nucleophilic ring opening of epoxides. These conditions require the use of a sub-stoichiometric amount of amine (10% mol) for dianion generation and the previous activation of the epoxide with LiCl. Yields are good, with high regioselectivity, but the use of styrene oxide led, unexpec...
Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. It yields better security than the ID-based without requiring digital certificates. In CL-PKC scheme, as Generation Center (KGC) generates public key using partial secret key, need for authenticating by trusted third party avoided. Due to lack of authen...
The reconfigurable intelligent surfaces (RIS) is a new technology that can be utilized to provide security vehicle-to-vehicle (V2V) communications at the physical layer. In this paper, we achieve higher key generation rate for V2V lower cost and computational complexity. We investigate use of passive RIS as relay, introduce channel diversity increase (KGR), accordingly. regard, consider subsets...
4 Voting with Homomorphic Encryption 3 4.1 Zero-Knowledge Proofs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.2 Homomorphic Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4.2.1 Homomorphic Encryption and Decryption . . . . . . . . . . . . . . . . . . . 4 4.2.2 Distributed Key Generation . . . . . . . . . . . . . . . . . . . . . . . . . . ...
In 1997, H. Sakazaki, E. Okamato and M. Mambo [4] proposed an ID-based key distribution system on an elliptic curve over Zn. We will cryptanalyze the scheme and demonstrate that when the hashed ID length is about 160 bits, the scheme is insecure. To be specific, after requesting a small number of keys from the Center, our attack allows a new valid key to be constructed without any further inter...
The group key management technique is an important for cryptographic applications. In this paper, we implemented our proposed method [1] on a protocol communication. authenticated distribution mechanism distributing key. We also discussed security analysis and attacks in active passive adversary model. Also, it ensures semantic as well Key freshness of the Along with this, they provide implicit...
As the product of third information technology revolution, Internet Things (IoT) has greatly altered our way lifetime. Cloud storage gradually become best choice for data processing due to its scalability and flexibility. However, cloud is not a completely trusted entity, such as tampering with user or leaking personal privacy. Therefore, usually adopts attribute-based encryption schemes accomp...
Body Area Networks (BAN) are wireless networks designed for deployment on or within the human body. These primarily intended application themedical domain due to their capabilities enablingwireless monitoring of physiological signals, and remote administration medical devices. Due use case, securing these devices is paramount. In recent years, several key generationand agreement schemes that re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید