CA2458819A1 - Protocole d'accord a cles base sur la dynamique du reseau - Google Patents
Protocole d'accord a cles base sur la dynamique du reseau Download PDFInfo
- Publication number
- CA2458819A1 CA2458819A1 CA002458819A CA2458819A CA2458819A1 CA 2458819 A1 CA2458819 A1 CA 2458819A1 CA 002458819 A CA002458819 A CA 002458819A CA 2458819 A CA2458819 A CA 2458819A CA 2458819 A1 CA2458819 A1 CA 2458819A1
- Authority
- CA
- Canada
- Prior art keywords
- string
- station
- gamma
- strings
- length
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002458819A CA2458819A1 (fr) | 2004-02-24 | 2004-02-24 | Protocole d'accord a cles base sur la dynamique du reseau |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002458819A CA2458819A1 (fr) | 2004-02-24 | 2004-02-24 | Protocole d'accord a cles base sur la dynamique du reseau |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2458819A1 true CA2458819A1 (fr) | 2005-08-24 |
Family
ID=34865929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002458819A Abandoned CA2458819A1 (fr) | 2004-02-24 | 2004-02-24 | Protocole d'accord a cles base sur la dynamique du reseau |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2458819A1 (fr) |
-
2004
- 2004-02-24 CA CA002458819A patent/CA2458819A1/fr not_active Abandoned
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030215088A1 (en) | Key agreement protocol based on network dynamics | |
Catalano et al. | Efficient network coding signatures in the standard model | |
Desmedt | Some recent research aspects of threshold cryptography | |
Vilela et al. | Lightweight security for network coding | |
Staddon et al. | Self-healing key distribution with revocation | |
US7609839B2 (en) | Quantum key distribution method and communication device | |
Zeng et al. | A distributed fault/intrusion-tolerant sensor data storage scheme based on network coding and homomorphic fingerprinting | |
Yao et al. | Network codes resilient to jamming and eavesdropping | |
D'Oliveira et al. | Post-quantum security for ultra-reliable low-latency heterogeneous networks | |
Wu et al. | Three improved algorithms for multipath key establishment in sensor networks using protocols for secure message transmission | |
Maurer | The role of information theory in cryptography | |
Safaka et al. | Exchanging pairwise secrets efficiently | |
CN114465733B (zh) | 一种基于改进rsa的安全网络编码方法 | |
CA2462384A1 (fr) | Protocole d'echange de cle fonde sur la dynamique d'un reseau | |
CA2458819A1 (fr) | Protocole d'accord a cles base sur la dynamique du reseau | |
IE20020742A1 (en) | A Key Agreement Protocol Based on Network Dynamics | |
AU2002339702A1 (en) | A key agreement protocol based on network dynamics | |
Ibrahim et al. | Ciphertext-only attack on RSA using lattice basis reduction | |
AU2004201034A1 (en) | A key agreement protocol based on network dynamics | |
Evgnosia-Alexandra | A note on post quantum onion routing | |
RU2812343C1 (ru) | Способ управления ресурсами аутентификации в сетях квантового распределения ключей, описываемых связными графами произвольных конфигураций | |
Noura et al. | Edca: efficient diffusion cipher and authentication scheme for wireless sensor networks | |
Gui et al. | A Threshold Authenticated Encryption Scheme for Secure Communications in Aging-in-Place Systems | |
Gabidulin et al. | Information security in a random network coding network | |
Safaka et al. | Exchanging secrets without using cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Discontinued |