ASIA unversity:Item 310904400/12814
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21673077      Online Users : 610
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/12814


    Title: Two Three-Party Key Distribution Protocols with Authenticated Time Constraint
    Authors: Lin, Syuan-Zong
    Contributors: Department of Computer Science and Information Engineering
    Chen, Hsing-Chung
    Keywords: key distribution protocol;authentication;security;time bound;Quantum key distribution;Quantum states;Cryptography
    Date: 2012
    Issue Date: 2012-11-18 09:54:04 (UTC+0)
    Publisher: Asia University
    Abstract: We propose two Three-Party Key Distribution Protocols with Authenticated Time Constraint, which the main techniques are referred from the traditional concepts of three-party encrypted key exchange protocols (3PEKE) and the three-party authenticated quantum key distribution protocols (3AQKD). In the paper, the session key will be changed at each time period. Each session key is corresponding to one time period which depending on the intersection set of both two parties' requesting time bounds. The first scheme is A Time Constraint Three-Party Encrypted Key Exchange (3PEKE-TC) Protocol in which both two parties only act as the roles within the relationship of exchanging secure messages constrained by the intersection time periods. The second scheme is Three-Party Authenticated Quantum Key Distribution Protocol with Time-Bound (3PAQKD-TB) protocol, in which each session key is corresponding to the measurement bases of dynamically changing for each time-period. Both parties will generate the different polarization quantum states for each time-period. Therefore, the eavesdroppers cannot guess out the bases easily. Both approaches can improve the performance compared with the traditional 3PEKE or 3AQKD scheme via the same technique of time constraint. It can get better performance on when three parties do many times compared with the traditional 3PEKE or 3AQKD protocol. Furthermore, we also proof both schemes can also against the password guessing attack as well as replay attack.
    Appears in Collections:[Department of Computer Science and Information Engineering] Theses & dissertations

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML317View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback