The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is anticipated that quantum key distribution enable us to share a secret key while guaranteeing unconditionally security. In this paper, we discuss the quantum key distribution using the Mean King Problem which was proposed by J. Bub in 2001. While this two-way quantum protocol is essentially different from the other one-way protocols like the BB84, it has been shown that Eve cannot gain any information...
An authentication protocol is proposed which originates from the elements of the authentication protocols belonging to the HB-family and the protocols based on employment of pseudorandom number generators. Desired features of the proposed protocol have been achieved via combining the pseudorandomnes generated by a compact keystream generator, randomness and dedicated homophonic and error-correction...
In the emergency broadcast system (or emergency alert system) which aims to broadcast a warning information immediately in time of emergency such as a natural or civil disaster, computational power-restricted devices such as, pocket terminals and sensors need to instantly and securely verify correctness and integrity of the received message packets. Though a lot of broadcast authentication systems...
In this paper, we study a key establishment scheme with quasi-cyclic (QC) low-density parity-check (LDPC) codes and universal hushing (UH) protocols. We show probabilities that different keys are shared by our error-correction and a privacy amplification scheme for a given key distribution scheme, and we propose a permutation technique that the probability becomes lower.
In this paper, we consider a ramp scheme for Key Predistribution System (KPS). In the ramp scheme, it can be regarded as one kind of generalization of KPS, and the required resources can be reduced at the cost of a security degradation which depends on the size of users. We define a ramp scheme for KPS, show lower bound on the amount of user' s information needed to generate a common key, and design...
The Probe Vehicle Information system is as system that collects information from cars equipped with sensors. Usually, various information is collected and transferred to a server, at frequent intervals. The information includes when and where the information was collected, which could lead to privacy problems. One way to solve these problems, is to use cryptographic anonymous authentication protocols...
The concept of personal networks is very user-centric and representative for the next generation networks. However, the present security mechanism does not consider at all what happens whenever a mobile node (device) is compromised, lost or stolen. Since a user may hold many different types of devices, the leakage of stored secrets sometimes results in the complete breakdown of the intended security...
We prove that the commitment capacity of the power-constrained Gaussian channel, i.e., the optimal rate at which this channel can be used for implementing commitment schemes, is infinite.
One of the next promising generation networks is personal networks where a user can make ad-hoc networks with his/her personal devices. However, the present security mechanism does not consider at all what happens whenever a mobile node (device) is compromised, lost or stolen. Since a user may hold many different types of devices, the leakage of stored secrets sometimes results in the complete breakdown...
The concept of personal networks is very user- centric and representative for the next generation networks. However, the present security mechanism is not considering at all what happens whenever a mobile node (device) is compromised, lost or stolen. This kinds of leakage of stored secrets has been a great danger in the field of communication security since it sometimes leads to the complete breakdown...
A private-personal area network (P-PAN) is the very user-centric and basis component of personal networks. However, the current security mechanism is not robust against leakage of stored secrets that can happen when a mobile node (device) is compromised, lost or stolen. This results in unauthorized accesses to other devices and services. For that, this paper introduces a leakage-resilient and forward...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.