搜索结果: 1-15 共查到“Tripartite”相关记录38条 . 查询时间(0.102 秒)
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols
Key agreement Tripartite Identitybased
2014/3/5
Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based au...
Tripartite Technical Meeting on Labour Migration - 4-8 November 2013
Tripartite Labour Migration
2013/10/12
A Tripartite Technical Meeting on Labour Migration will be held to enable the Organization to assess the outcome of the High-Level Dialogue on International Migration and Development and consider poss...
Detecting Communities in Tripartite Hypergraphs
Detecting Communities Tripartite Hypergraphs
2010/11/17
In social tagging systems, also known as folksonomies, users collaboratively manage tags to annotate resources. Naturally, social tagging systems can be modeled as a tripartite hypergraph, where there...
The tripartite entanglement is examined when one of the three parties moves with a uniform acceleration with respect to other parties. As Unruh effect indicates, the tripartite entanglement exhibits ...
Genuine Tripartite Entanglement in a Spin-Star Network at Thermal Equilibrium
Genuine Tripartite Entanglement Spin-Star Network Thermal Equilibrium
2010/10/29
In a recent paper [M. Huber {\it et al}, Phys. Rev. Lett. {\bf 104}, 210501 (2010)] new criteria to find out the presence of multipartite entanglement have been given. We exploit these tools in order ...
Tripartite thermal correlations in an inhomogeneous spin-star system
Tripartite thermal correlations inhomogeneous spin-star system
2010/10/20
We exploit the tripartite negativity to study the thermal correlations in a tripartite system, that is the three outer spins interacting with the central one in a spin-star system. We analyze the depe...
Tripartite connection condition for quantum graph vertex
Schrodinger operator singular vertex boundary conditions
2010/10/21
We discuss formulations of boundary conditions in a quantum graph vertex and demonstrate that the so-called S Tform can be further reduced up to a form more effective in certain applications: In parti...
Tripartite connection condition for quantum graph vertex
Schrodinger operator singular vertex boundary conditions
2010/12/16
We discuss formulations of boundary conditions in a quantum graph vertex and demonstrate that the so-called S Tform can be further reduced up to a form more effective in certain pplications: In partic...
A modified eCK model with stronger security for tripartite authenticated key exchange
Zhengzhou Information Science and Technology Institute
2010/2/1
Since Bellare and Rogaway presented the first formal security model for
authenticated key exchange (AKE) protocols in 1993, many formal security
models have been proposed. The extended Canetti-Krawc...
Svetlichny's inequality and genuine tripartite nonlocality in three-qubit pure states
Svetlichny's inequality genuine tripartite nonlocality three-qubit pure states
2010/4/7
The violation of the Svetlichny's inequality (SI) [Phys. Rev. D, 35, 3066 (1987)] is sufficient but not necessary for genuine tripartite nonlocal correlations. Here we quantify the relationship betwee...
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols
Postponed ephemeral keys pseudo-static keys tripartite key agreement
2009/9/2
We propose an new one-round implicitly authenticated three-party protocol that ex-
tends Joux's protocol as well as a two-party identity-based protocol. Our protocols have a single
communication rou...
A Note on Ideal Tripartite Access Structures.
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
Key agreement Bilinear pairings Identity-based cryptography
2009/4/15
With various applications of Weil pairing (Tate pairing) to
cryptography, ID-based encryption schemes, digital signature schemes,
blind signature scheme, two-party authenticated key agreement scheme...
Tripartite Authenticated Key Agreement Protocols from Pairings
Secure protocols key agreement authentication
2009/4/13
Joux's protocol [29] is a one round, tripartite key agreement protocol that is more bandwidth-
efficient than any previous three-party key agreement protocol. But it is insecure, suffering from a sim...
This paper proposes a new identity based tripartite key agreement protocol which is more
efficient than the existing ID-based tripartite protocol. This protocol is based on the Joux's protocol for ke...