搜索结果: 1-15 共查到“军事学 security proof”相关记录17条 . 查询时间(0.106 秒)
Security proof for Quantum Key Recycling with noise
quantum cryptography quantum key recycling
2018/3/13
Quantum Key Recycling aims to re-use the keys employed in quantum encryption and quantum authentication schemes. We consider QKR protocols where classical information is embedded in qubit states. A pa...
We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme. Our proof consists of the following steps. We construct an EPR var...
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases
JAMBU CAESAR Competition Provable Security
2017/9/1
JAMBU is an AEAD mode of operation which entered the third round of CAESAR competition. However, it does not have a security proof like other modes of operation do, and there was a cryptanalysis resul...
Comments on “Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof”
public-key cryptography Security Analysis
2016/12/15
In CT-RSA 2016, Chen, Mu, Yang, Susilo and Guo proposed a strongly leakage-resilient authenticated key exchange (AKE) protocol. In a rencent work, Chakraborty et al. claimed that they identified a fla...
Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof
Authenticated Key Exchange DDH GDH
2016/12/9
In this paper, we revisit the security result of an authenticated key exchange (AKE) protocol recently proposed in CT-RSA 2016 by Chen, Mu, Yang, Susilo and Guo (we refer to this scheme as the CMYSG s...
A Security Proof of KCDSA using an extended Random Oracle Model
Cryptography Provable Security KCDSA
2016/1/9
We describe a tight security reduction to the discrete logarithm
problem for KCDSA under an extended Random Oracle Model. This
is achieved by generalising the signature scheme and producing a securi...
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
Cryptographically Sound Security Proof On-Demand Source Routing Protocol EndairA
2011/3/11
We present the first cryptographically sound security proof of a routing
protocol for mobile ad-hoc networks. More precisely, we show that the route
discovery protocol does not output a non-existing...
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
cryptographic protocols
2012/3/29
We present the first cryptographically sound security proof of a routing protocol for mobile ad-hoc networks. More precisely, we show that the route discovery protocol does not output a non-existing p...
Security Proof of AugPAKE
cryptographic protocols PAKE on-line/off-line dictionary attacks provable security SDH random oracle
2010/7/14
In this paper, we show that the AugPAKE protocol provides the semantic security of session keys under the strong Diffie-Hellman (SDH) assumption in the random oracle model.
Security Proof for the Improved Ryu{Yoon{Yoo Identity-Based Key Agreement Protocol
Key agreement protocols Reection attack Provable security
2009/6/2
Key agreement protocols are essential for secure communications in open
and distributed environments. The protocol design is, however, extremely error-prone
as evidenced by the iterative process of ...
We introduce the OAEP++ encoding method, which is an adaptation
of the OAEP encoding method, replacing the last step of the
encoding operation with an application of a block cipher such as AES.
We ...
We provide a new security proof for a variant of ElGamal proposed by Damg°ard,
showing that it is secure against non-adaptive chosen ciphertext. Unlike previous
security proofs for this cryptosystem...
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Security Proof Sakai-Kasahara's Identity-Based Encryption Scheme
2009/2/18
Identity-based encryption (IBE) is a special asymmetric en-
cryption method where a public encryption key can be an arbitrary iden-
tifier and the corresponding private decryption key is created by ...
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants
Security Proof McCullagh-Barreto's Key Agreement Protocol Variants
2009/2/16
McCullagh and Barreto presented an identity-based authenticated key
agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a
key-compromise impersonation attack. In order t...
Security Proof of ”Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA”
Security Proof Leakage-Resilient Authenticated Key Transport Protocol RSA
2009/2/13
In this paper, we prove the security of the RSA-AKE protocol [9] in the random oracle
model. The proof states that the RSA-AKE protocol is secure against an adversary who gets the
client’s stored se...