ASIA unversity:Item 310904400/12814
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 94286/110023 (86%)
造访人次 : 21673032      在线人数 : 571
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    ASIA unversity > 資訊學院 > 資訊工程學系 > 博碩士論文 >  Item 310904400/12814


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/12814


    题名: Two Three-Party Key Distribution Protocols with Authenticated Time Constraint
    作者: Lin, Syuan-Zong
    贡献者: Department of Computer Science and Information Engineering
    Chen, Hsing-Chung
    关键词: key distribution protocol;authentication;security;time bound;Quantum key distribution;Quantum states;Cryptography
    日期: 2012
    上传时间: 2012-11-18 09:54:04 (UTC+0)
    出版者: Asia University
    摘要: We propose two Three-Party Key Distribution Protocols with Authenticated Time Constraint, which the main techniques are referred from the traditional concepts of three-party encrypted key exchange protocols (3PEKE) and the three-party authenticated quantum key distribution protocols (3AQKD). In the paper, the session key will be changed at each time period. Each session key is corresponding to one time period which depending on the intersection set of both two parties' requesting time bounds. The first scheme is A Time Constraint Three-Party Encrypted Key Exchange (3PEKE-TC) Protocol in which both two parties only act as the roles within the relationship of exchanging secure messages constrained by the intersection time periods. The second scheme is Three-Party Authenticated Quantum Key Distribution Protocol with Time-Bound (3PAQKD-TB) protocol, in which each session key is corresponding to the measurement bases of dynamically changing for each time-period. Both parties will generate the different polarization quantum states for each time-period. Therefore, the eavesdroppers cannot guess out the bases easily. Both approaches can improve the performance compared with the traditional 3PEKE or 3AQKD scheme via the same technique of time constraint. It can get better performance on when three parties do many times compared with the traditional 3PEKE or 3AQKD protocol. Furthermore, we also proof both schemes can also against the password guessing attack as well as replay attack.
    显示于类别:[資訊工程學系] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML316检视/开启


    在ASIAIR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈