期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs
1
作者 Rajeev Singh Teek Parval Sharma 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第2期144-152,共9页
Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs.... Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation. 展开更多
关键词 Authentication authentication frames receiver verified lightweight operations cryptographic encryption sender
下载PDF
A Secure Scalar Product Protocol Against Malicious Adversaries 被引量:3
2
作者 Bo Yang Yong Yu Chung-Huang Yang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期152-158,共7页
A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors... A secure scalar product protocol is a type of specific secure multi-party computation problem. Using this kind of protocol, two involved parties are able to jointly compute the scalar product of their private vectors:, but no party will reveal any information about his/her private vector to another one. The secure scalar product protocol is of great importance in many privacy-preserving applications such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we give an efficient and secure scalar product protocol in the presence of malicious adversaries based on two important tools: the proof of knowledge of a discrete logarithm and the verifiable encryption. The security of the new protocol is proved under the standard simulation-based definitions. Compared with the existing schemes, our scheme offers higher efficiency because of avoiding inefficient cut-and-choose proofs. 展开更多
关键词 secure multi-party computation secure scalar product protocol verifiable encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部