排序方式: 共有95条查询结果,搜索用时 15 毫秒
71.
To achieve privacy and authentication simultaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications . In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications . 相似文献
72.
73.
74.
We analyse the security of a quantum secure direct communication (QSDC) protocol and find that an eavesdropper can utilize a special property of GHZ states to elicit all or part of the transmitted secrets without being detected. The particular attack strategy is presented in detail. We give an improved version of this protocol so that it can resist this attack. 相似文献
75.
76.
Economical multiparty simultaneous quantum identity authentication based on Greenberger--Horne--Zeilinger states 下载免费PDF全文
A multiparty simultaneous quantum identity authentication protocol
based on Greenberger--Horne--Zeilinger (GHZ) states is proposed. The
multi-user can be authenticated by a trusted third party (TTP)
simultaneously. Compared with the scheme proposed recently (Wang
et al 2006, Chin. Phys. Lett. 23(9) 2360), the
proposed scheme has the advantages of consuming fewer quantum and
classical resources and lessening the difficulty and intensity of
necessary operations. 相似文献
77.
提出了一种网络多用户量子认证和密钥分配理论方案.类似于现代密码学中的网络认证体系结构提出了一种基于网络中用户与所属的可信服务器之间共享Einstein-Podolsky-Rosen(EPR)纠缠对进行身份认证和密钥分配的分布式客户机/服务器体系结构.基于该体系结构实现网络中任意用户之间的身份认证和密钥分配.可信服务器只提供用户的身份认证以及 交换粒子之间的纠缠使得两个想要秘密通信的用户的粒子纠缠起来.密钥的生成由发起请求 的用户自己完成.网络中的用户只需和所属的可信服务器共享EPR纠缠对通过经典信道和量子 信道与服务器通信.用户不需要互相共享EPR纠缠对,这使得网络中的EPR对的数量由O(n2)减小到O(n).
关键词:
量子认证
量子密钥分配
客户机/服务器
纠缠交换 相似文献
78.
79.
Using the generalized Bell states and quantum gates, we introduce a quantum encryption scheme of d-level states (qudits). The scheme can detect and correct arbitrary transmission errors using only local operations and classical communications between the communicators. In addition, the entanglement key used to encrypt can be recycled. The protocol is informationally secure, because the output state is a totally mixed one for every input state p. 相似文献
80.
RBAC角色继承关系中私有权限问题的研究 总被引:2,自引:0,他引:2
角色的私有权问题一直是RBAC中没有解决的问题。在分析现有的私有权解决方案的基础上,提出了角色的N阶继承方法,将角色的权限分为私有、保护和公有三类,对保护权限的继承进行了定义。为了能够将一个角色的非私有权限继承为私有权限,又提出了三种不同的继承模式:Private模式、Protected模式和Public模式。 相似文献