ASIA unversity:Item 310904400/12814
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 94286/110023 (86%)
造訪人次 : 21674509      線上人數 : 559
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    ASIA unversity > 資訊學院 > 資訊工程學系 > 博碩士論文 >  Item 310904400/12814


    請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/12814


    題名: Two Three-Party Key Distribution Protocols with Authenticated Time Constraint
    作者: Lin, Syuan-Zong
    貢獻者: Department of Computer Science and Information Engineering
    Chen, Hsing-Chung
    關鍵詞: key distribution protocol;authentication;security;time bound;Quantum key distribution;Quantum states;Cryptography
    日期: 2012
    上傳時間: 2012-11-18 09:54:04 (UTC+0)
    出版者: Asia University
    摘要: We propose two Three-Party Key Distribution Protocols with Authenticated Time Constraint, which the main techniques are referred from the traditional concepts of three-party encrypted key exchange protocols (3PEKE) and the three-party authenticated quantum key distribution protocols (3AQKD). In the paper, the session key will be changed at each time period. Each session key is corresponding to one time period which depending on the intersection set of both two parties' requesting time bounds. The first scheme is A Time Constraint Three-Party Encrypted Key Exchange (3PEKE-TC) Protocol in which both two parties only act as the roles within the relationship of exchanging secure messages constrained by the intersection time periods. The second scheme is Three-Party Authenticated Quantum Key Distribution Protocol with Time-Bound (3PAQKD-TB) protocol, in which each session key is corresponding to the measurement bases of dynamically changing for each time-period. Both parties will generate the different polarization quantum states for each time-period. Therefore, the eavesdroppers cannot guess out the bases easily. Both approaches can improve the performance compared with the traditional 3PEKE or 3AQKD scheme via the same technique of time constraint. It can get better performance on when three parties do many times compared with the traditional 3PEKE or 3AQKD protocol. Furthermore, we also proof both schemes can also against the password guessing attack as well as replay attack.
    顯示於類別:[資訊工程學系] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML321檢視/開啟


    在ASIAIR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋