搜索结果: 1-8 共查到“军事学 Ephemeral”相关记录8条 . 查询时间(0.171 秒)
Tree authenticated ephemeral keys
public-key cryptography digital signatures key management
2019/8/14
Public key algorithms based on QC-MPDC and QC-LDPC codes for key encapsulation/encryption submitted to NIST post-quantum competition (BIKE, QC-MDPC KEM, LEDA) are vulnerable against reaction attacks b...
Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
identification scheme ephemeral secret setting ephemeral secret leakage
2019/4/3
In this paper we concern anonymous identification, where the verifier can check that the user belongs to a given group of users (just like in case of ring signatures), however a transcript of a sessio...
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
chameleon-hash functions chameleon-hash functions with ephemeral trapdoors trapdoor commitments
2017/2/20
A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the noti...
Group key exchange protocols withstanding ephemeral-key reveals
Group Key Agreement Strong Security Ephemeral Keys
2016/12/29
When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets;
long-term keys (for authentication) and freshly generated (often random) values. The ...
Efficient ephemeral elliptic curve cryptographic keys
Elliptic curve cryptography complex multiplication method
2015/12/29
We show how any pair of authenticated users can on-the-fly agree on an elliptic
curve group that is unique to their communication session, unpredictable to outside
observers, and secure against know...
Ephemeral key compromise attack on the IB-KA protocol
Ephemeral key compromise attack Authenticated key exchange Canetti-Krawczyk model
2009/12/29
Recently, Dario Fiore and Rosario Gennaro proposed the
IB-KA protocol, which was inspired by MQV protocol. They provide a
full proof of security of IB-KA protocol using techniques developed by
Kraw...
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Postponed ephemeral keys pseudo-static keys tripartite key agreement
2009/9/2
We propose an new one-round implicitly authenticated three-party protocol that ex-
tends Joux's protocol as well as a two-party identity-based protocol. Our protocols have a single
communication rou...
Session-state Reveal is stronger than Ephemeral Key Reveal:Breaking the NAXOS key exchange protocol
Session-state Reveal Ephemeral Key Reveal NAXOS key exchange protocol
2009/6/9
In the papers "Stronger Security of Authenticated Key Exchange" [LLM07, LLM06], a
new security model for key exchange protocols is proposed. The new model is suggested
to be at least as strong as pr...