Reputation systems are having increasing influence on guarding P2P networks. However, reputation systems themselves are vulnerable to attack. Due to the nature of aggregating ratings, the reputation scores of certain ...
详细信息
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo...
详细信息
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is proposed. Its authentication part is proven secure against existential forgery on adaptively chosen message and ID attacks under the random oracle model upon the CDH assumptions. The session keys are proven secure in a formal CK security model under the random oracle model upon the CBDH assumptions. Compared with the previous multiple key agreement protocols,it requires less communication cost.
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...
详细信息
Resilient Boolean functions have many applications in fault-tolerant distributed computing and quantum cryptographic key. Construction of this class functions with more cryptographic criteria such as high nonlinearity...
详细信息
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected int...
详细信息
In this paper, we explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authentication and random number ...
详细信息
RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with O...
详细信息
RFID has been widely used in personal life. To the security problems of RFID, there are many different kinds of strategies and protocol, This article point out the disadvantages of these protocols, then come up with One block Hash function, and make a comparison with the most popular MD5 algorithm, improve the RFID authentication protocol by One block Hash function, and show the comparison with the now most popular algorithm on the security, computation and memory capability. This RFID authentication protocol based on one block Hash function can guarantee the safety, meanwhile, reduce the amount of computation of the tag, and achieve the function of low-power in authentic process of tags. It has resolved the two shackles in the development of the RFID system.
1 Introduction With the development of QSDC, the bidirectional QSDC protocol[8] was proposed in 2004, in which the two communicators can exchange their secret messages simultaneously, it is also called quantum ***, th...
1 Introduction With the development of QSDC, the bidirectional QSDC protocol[8] was proposed in 2004, in which the two communicators can exchange their secret messages simultaneously, it is also called quantum ***, there is a serious problem called "information leakage" or "classical correlation" in some of these quantum dialogue protocols[8-10], which is pointed out by Gao et al.[16]and Tan [17]independently.
Much of the security of many block ciphers depends on the cryptographic properties of the substitution boxes (S-boxes). Although many design methods of S-boxes with desirable properties have been studied, there are fe...
详细信息
A class of balanced semi-bent functions with an even number of variables is proposed. It is shown that they include one subclass of semi-bent functions with maximum algebraic degrees. Furthermore, an example of semi-b...
详细信息
暂无评论