نتایج جستجو برای: probabilistic key sharing

تعداد نتایج: 694661  

Journal: :CoRR 2015
Laszlo Gyongyosi

We propose the Gaussian quadrature inference (GQI) method for multicarrier continuousvariable quantum key distribution (CVQKD). A multicarrier CVQKD protocol utilizes Gaussian subcarrier quantum continuous variables (CV) for information transmission. The GQI framework provides a minimal error estimate of the quadratures of the CV quantum states from the discrete, measured noisy subcarrier varia...

2016
M. Fujiwara A. Waseda R. Nojima S. Moriai W. Ogata M. Sasaki

Information theoretically secure distributed storage system with quantum key distribution network and password authenticated secret sharing scheme M. Fujiwara1*, A. Waseda1, R. Nojima1, S. Moriai1, W. Ogata2 and M. Sasaki1 1National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-kita, Koganei, Tokyo 184-8795, Japan 2Tokyo Institute of Technology, 2-12-1 Ookayama, Meg...

Journal: :Int. J. Communication Systems 2014
Yanjun Liu Lein Harn Chin-Chen Chang

A group key distribution protocol can enable members of a group to share a secret group key and use it for secret communications. In 2010, Harn and Lin proposed an authenticated group key distribution protocol using polynomial-based secret sharing scheme. Recently, Guo and Chang proposed a similar protocol based on the generalized Chinese remainder theorem. In this paper, we point out that ther...

Journal: :I. J. Network Security 2008
Hwa Young Um Edward J. Delp

In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the receiving and transmitting ends. Mobility is one of the most distinct features to be considered in wireless networks. Moving users onto the key tree causes extra key management resources even though they are still in s...

Journal: :I. J. Network Security 2017
Arup Kumar Chattopadhyay Amitava Nag Koushik Majumder

Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower management overhead, elasticity of storage etc and these encourage organizations to use cloud computing to outsource massive amount of data to the cloud providers. The outsourced environment of the cloud and its inherent loss of control cause risk of exposing highly sensitive data to internal or external attacks. Tr...

2013
Wei Yuan Liang Hu Hongtu Li Jianfeng Chu

Recently Harn and Lin proposed a novel authenticated group key transfer protocol that a mutually trusted key generation center (KGC) can broadcast group key information to all group members at once and only authorized group members can recover the group key. This paper presents that Harn and Lin’s protocol can not withstand man-in-the-middle attack and describes the reasons and detailed process...

2014
Jie Cui Lei Chen Yiming Zhang Zhiqiang Xie Hong Zhong

In order to solve the key setting difficulty and the key security problem in the file encryption, key distributed storage technology may be a proper choice to help improve the safety of the key. In the paper, a novel secret sharing scheme is proposed by AES encryption algorithm for file confidentiality, dynamic key generation mechanism to generate keys, multisecret-sharing ideas on key pre-trea...

1994
Carlo Blundo Alfredo De Santis

Randomness is a useful computation resource due to its ability to enhance the capabilities of other resources. Its interaction with resources such as time, space, interaction with provers and its role in several areas of computer science has been extensively studied. In this paper we give a systematic analysis of the amount of randomness needed by secret sharing schemes and secure key distribut...

2010
Mark Manulis Bertram Poettering Gene Tsudik

In Secret Handshakes (SH) and Affiliation-Hiding Authenticated Key Exchange (AH-AKE) schemes, users become group members by registering with Group Authorities (GAs) and obtaining membership credentials. Group members then use their membership credentials to privately authenticate each other and communicate securely. The distinguishing privacy property of SH and AH-AKE is that parties learn each...

2009
Caimu Tang Dapeng Oliver Wu Anthony T. Chronopoulos

In this paper, we propose an efcient multi-party signature scheme for wireless networks where a given number of signees can jointly sign a document, and it can be veried by any entity who possesses the certied group public key. Our scheme is based on an efcient threshold key generation scheme which is able to defend against both static and adaptive adversaries. Specically, our key generati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید