Results 21 to 30 of about 3,071,363 (328)
Key exchange protocol based on the private key [PDF]
At present, most existing key exchange protocols for three-party (3pake) are easily attacked by server key disclosure, dictionary attack and so on. This paper analyses the weakness of the previous work , and presents a key exchange for three-party based on the private key .This method can resist common attack through safety analysis, and the efficiency
Wenqian Shang, Tong Yi, Minyong Shi
openaire +2 more sources
Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj +1 more source
A Secure Mobile Banking Using Kerberos Protocol [PDF]
Because the network is an open environment, a lot of care must be taken whentransferring sensitive information especially when related with financial data.
Mohammad N. Abdullah, May T. Abdul-Hadi
doaj +1 more source
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng+3 more
core +1 more source
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu+4 more
core +1 more source
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa+2 more
doaj +1 more source
Practical private database queries based on a quantum key distribution protocol [PDF]
Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a
A. Jakoby+17 more
core +4 more sources
Secure key from bound entanglement [PDF]
We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation.
Horodecki, Karol+3 more
core +2 more sources
Key-Private Proxy Re-encryption [PDF]
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys
ATENIESE, GIUSEPPE+2 more
openaire +2 more sources
Bitcoin private key locked transactions [PDF]
Abstract Bitcoin smart contracts allow the development of new protocols on top of Bitcoin itself. This usually involves the definition of complex scripts, far beyond the requirement of a single signature. In this paper we introduce the concept of private key locked transactions, a novel type of transactions that allows the atomic verification of a ...
Sergi Delgado-Segura+3 more
openaire +2 more sources