期刊文献+

二次检索

题名
关键词
文摘
作者
第一作者
机构
刊名
分类号
参考文献
作者简介
基金资助
栏目信息

年份

共找到4篇文章
< 1 >
每页显示 20 50 100
Authenticated Key Agreement Protocol
1
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
Threshold Decryption Scheme withMultiple Policies
2
作者 FEIRu-chun WANGLi-na 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期243-247,共5页
Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of... Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of users to share multiple secrttkeys and only onesecret shadow to be ktpt by each user. An efficient threshold decryption scheme with multiplepolicies is designed on the basis of the basic threshold scheme. This decryption scheme allowsmultiple secret keys to he shared among a groupof users, and each user to ketp only one secretshadow. Different public keys can be used to encrypt documents. If and only if the number ofcooperated users who koop the secret shadows is greater than or c-qual to the threshold value of thecorresponding secret key, they can cooperate to decrypt the documents. It is proved that theproposed scheme has very strong security, unless the attackers can solve the discrete logarithmproblem and the square root problem. 展开更多
关键词 multiple secret keys threshold scheme seeret shadow discrete logarithm square root threshold deayp-tion scheme
下载PDF
A Primal-Dual Infeasible-Interior-Point Algorithm for Multiple Objective Linear Programming Problems
3
作者 HUANGHui FEIPu-sheng YUANYuan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第2期351-354,共4页
A primal-dual infeasible interior point algorithm for multiple objective linear programming (MOLP) problems was presented. In contrast to the current MOLP algorithm. moving through the interior of polytope but not con... A primal-dual infeasible interior point algorithm for multiple objective linear programming (MOLP) problems was presented. In contrast to the current MOLP algorithm. moving through the interior of polytope but not confining the iterates within the feasible region in our proposed algorithm result in a solution approach that is quite different and less sensitive to problem size, so providing the potential to dramatically improve the practical computation effectiveness. 展开更多
关键词 key words multiple objective linear programming primal dual infeasible INTERIOR point algorithm
下载PDF
High-speed and high-performance polarization-based quantum key distribution system without side channel effects caused by multiple lasers 被引量:1
4
作者 HEASlN Ko BYUNG-SEOK CHOI +3 位作者 JOONG-SEON CHOE KAP-JOONG KIM JONG-Hol KIM CHUN JU YOUN 《Photonics Research》 SCIE EI 2018年第3期214-219,共6页
Side channel effects such as temporal disparity and intensity fluctuation of the photon pulses caused by random bit generation with multiple laser diodes in high-speed polarization-based BB84 quantum key distribution(... Side channel effects such as temporal disparity and intensity fluctuation of the photon pulses caused by random bit generation with multiple laser diodes in high-speed polarization-based BB84 quantum key distribution(QKD) systems can be eliminated by increasing the DC bias current condition. However, background photons caused by the spontaneous emission process under high DC bias current degrade the performance of QKD systems. In this study, we investigated the effects of spontaneously emitted photons on the system performance in a high-speed QKD system at a clock rate of 400 MHz. Also, we show further improvements in the system performance without side channel effects by utilizing the temporal filtering technique with real-time fieldprogrammable gate array signal processing. 展开更多
关键词 QKD High-speed and high-performance polarization-based quantum key distribution system without side channel effects caused by multiple lasers
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部