搜索结果: 1-15 共查到“军队指挥学 Key Distribution”相关记录26条 . 查询时间(0.109 秒)
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Lattice cryptography Public-key encryption Noisy ElGamal
2019/4/22
Lattice-based public-key encryption has a large number of design choices that can be combined in diverse ways to obtain different tradeoffs. One of these choices is the distribution from which secret ...
Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
multi-cast key distribution exposure resilience star topology
2016/12/10
In this paper, we propose a two-round dynamic multi-cast key distribution (DMKD) protocol under the star topology with a central authentication server. Users can share a common session key without rev...
Quantum key distribution with combined conjugate coding and information overloading
quantum key distribution conjugate coding
2016/5/9
Current quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measureme...
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography conjugate coding quantum money
2016/1/26
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is
quantum key dist...
On the Security of a Self-healing Group Key Distribution Scheme
Cryptanalysis forward security collusion resistance
2015/12/25
Recently, in Journal of Security and Communication Networks (5(12):1363-1374, DOI: 10.1002/
sec.429), Wang et al. proposed a group key distribution scheme with self-healing property for
wireless net...
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
self-healing group key distribution forward security backward secrecy
2015/12/24
In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for
resource-constrained wireless networks in Journal of Sensors (14(14):24358-24380, DOI: 10.3390/
s141224358...
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks
multidimensional linear attack zero-correlation linear
2015/12/22
The power of a statistical attack is inversely proportional to
the number of plaintexts necessary to recover information on the encryption
key. By analyzing the distribution of the random variables ...
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
applications
2012/3/21
Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we discuss fundamental differe...
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
applications
2012/3/23
Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we discuss fundamental differe...
The Case for Quantum Key Distribution
Quantum Key Distribution QKD future cryptographic infrastructures
2009/6/12
Quantum key distribution (QKD) promises secure key agreement by
using quantum mechanical systems. We argue that QKD will be an important
part of future cryptographic infrastructures. It can provide ...
Flaws in Some Self-Healing Key Distribution Schemes with Revocation
self-healing key distribution lower bounds polynomial interpolation
2009/6/5
Dutta and Mukhopadhyay have recently proposed some very efficient self-
healing key distribution schemes with revocation. The parameters of these
schemes contradict some results (lower bounds) prese...
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications
Efficient Key Distribution Schemes Large Scale Mobile Computing Applications Mobile Computing
2009/6/5
In emerging networks consisting of large-scale deployments of mobile devices, efficient security mechanisms
are required to facilitate cryptographic authentication. While computation and bandwidth ov...
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
sensor network key distribution scheme attack cluster head.
2009/6/5
A sensor network key distribution scheme for hierarchical sensor networks was recently pro-
posed by Cheng and Agrawal. A feature of their scheme is that pairwise keys exist between
any pair of high...
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
Unidirectional Key Distribution RFID Security unidirectional channels
2009/6/2
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender
transmits information blindly to a receiver. We consider two approaches: (1) Key sharing across s...
TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks
TinyPBC Authenticated Identity-Based Non-Interactive Key Sensor Networks
2009/6/2
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmet-
ric cryptosystems can perform it efficiently, but they often do not provide a perfect
trade-off between resilience and sto...