نتایج جستجو برای: probabilistic key sharing

تعداد نتایج: 694661  

2012
R. Sailaja P. Sujatha

Group key protocols are still an important research issue in the network security, generation and sharing the secret session key is the important factor during the the groupkey transfer protocols. Usually it will be taken care of KGC. KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol b...

Journal: :CoRR 2017
Stephen Smart Christan Grant

More data is currently being collected and shared by software applications than ever before. In many cases, the user is asked if either all or none of their data can be shared. We hypothesize that in some cases, users would like to share data in more complex ways. In order to implement the sharing of data using more complicated privacy preferences, complex data sharing policies must be used. Th...

2016
Kongkiti Phusavat

This paper aimed to analyzed the factors influencing knowledge sharing. An integrative literature review was employed as a tool in analyzing step. Total twenty academic papers which concerned with knowledge sharing were chosen. Thirty five factors were mentioned in those literatures. As a result, five factors which were most mentioned in earlier literatures were chosen as a key success factors ...

Journal: :Inf. Sci. 2010
Hong Yuan Futai Zhang Xinyi Huang Yi Mu Willy Susilo Lei Zhang

A (t,n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with nmembers. In contrast to the traditional public key cryptography based on public key infrastructure (PKI) and identity-based public key cryptography (IDPKC), certificateless public key cryptography (CL-PKC) offers useful properties as it does not require any certificates to ensure ...

As knowledge is power, information is power in supply chains. It (information) provides the decision maker the power to get ahead of the competition, the power to run a business smoothly and efficiently, and the power to succeed in an ever more complex environment. Information plays a key role in the management of the supply chain. but how the different combination of information sharing based ...

Journal: :The Computer Science Journal of Moldova 2016
Nikolay A. Moldovyan Alexander A. Moldovyan Dmitriy N. Moldovyan Victor A. Shcherbacov

A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed wi...

Journal: :Des. Codes Cryptography 1997
Douglas R. Stinson

This paper provides an exposition of methods by which a trusted authority can distribute keys and/or broadcast a message over a network , so that each member of a privileged subset of users can compute a speciied key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to k...

Journal: :I. J. Network Security 2015
Cheng Guo Chin-Chen Chang

The conference-key agreement protocol is a mechanism for generating a common session key among the authorized conference members. The common session key is used to encrypt communication messages transmitted over an open network. Inspired by traditional key agreement protocols and threshold cryptosystems, we have proposed a novel threshold conference-key agreement protocol in this paper. In the ...

2003
Bruce Christianson Michael Roe David Wheeler

Sometimes two parties who share a weak secret k such as a password wish to share a strong secret s such as a session key without revealing information about k to an active attacker. We assume that both parties can generate strong random numbers and forget secrets, and present three protocols for secure strong secret sharing, based on RSA, Diffie-Hellman, and El-Gamal. As well as being simpler a...

Journal: :International Journal of Security and Its Applications 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید