Results 301 to 310 of about 6,885,434 (317)

ELK Key Distribution [PDF]

open access: possible, 2003
Broadcast streams require authentication and confidentiality. Previous chapters present protocols for efficient authentication and signature protocols for broadcast streams. This chapter discusses confidentiality and access control.
Adrian Perrig, J. D. Tygar
openaire   +1 more source

Enhancing 802.11i key distribution using quantum key distribution

International Journal of Applied Research on Information Technology and Computing, 2011
Security of data is one of the most important factors to take into account while elaborating any information system, especially when the information is transmitted over a wireless network like one of a company, a factory, a campus, or more importantly a battlefield.
Mohamed Benmohammed, Rima Djellab
openaire   +2 more sources

On the Distribution of a Key Distribution Center

2001
A Key Distribution Center of a network is a server who generates and distributes secret keys used by groups of users to securely communicate. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we study Distributed Key Distribution Centers, pointing out the advantages of this approach
openaire   +3 more sources

On Key Distribution in MANETs

2009 Fifth International Conference on Signal Image Technology and Internet Based Systems, 2009
We first review and compare private key distributions in MANETs based on secret sharing schemes. Since there exist many kinds of networks with different objectives and constraints, we then determine the suitable private key distribution scheme according to the nature of the network.
Alexis Bonnecaze, Alban Gabillon
openaire   +2 more sources

Communication in key distribution schemes

IEEE Transactions on Information Theory, 1996
Summary: A \((g,b)\) key distribution scheme allows conferences of \(g\) users to generate secret keys, such that disjoint coalitions of \(b\) users cannot gain any information on the generated key (in the information-theoretic sense). In this work, we study the relationships between communication and space efficiency of key distribution schemes.
Benny Chor, Amos Beimel
openaire   +1 more source

On the distribution of keys by hashing

12th International Conference of the Chilean Computer Science Society, 2002. Proceedings., 2003
The distribution of keys by a hash function as used in hash search with chaining is studied by considering the distribution of keys a random function front keys to buckets would give. This model gives surprisingly simple expressions for the mean value of some statistics on hash functions.
openaire   +1 more source

A conference key distribution system

IEEE Transactions on Information Theory, 1982
Encryption is used in a communication system to safeguard information in the transmitted messages from anyone other than the intended receiver(s). To perform the encryption and decryption the transmitter and receiver(s) ought to have matching encryption and decryption keys.
I. Ingemarsson, D. Tang, C. Wong
openaire   +1 more source

Quantum Key Distribution [PDF]

open access: possible, 2010
In this chapter a complete QKD protocol is presented, starting from the transmission via the quantum channel up to the communication over the public channel. The protocol described here is the BB84 protocol, named after Bennett and Brassard [5]. There are other protocols like the B92 protocol [3], the six-state protocol [8], the SARG protocol [19] and ...
openaire   +1 more source

On Key Distribution Systems

2007
Zero Knowledge (ZK) theory formed the basis for practical identification and signature cryptosysems (invented by Fiat and Shamir). It also was used to construct a key distribution scheme (invented by Bauspiess and Knobloch); however, it seems that the ZK concept is less appropriate for key distribution systems (KDS), where the main cost is the number ...
Yacov Yacobi, Zahava Shmuely
openaire   +2 more sources

Quantum Key Distribution

2018
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Mayssaa El Rifai   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy