On τ-time secure key agreemen

来源 :Science China(Information Sciences) | 被引量 : 0次 | 上传用户:youwdw
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
A τ-time key agreement system(τ-time KAS) is an unconditionally secure key agreement where an attacker cannot obtain any information about the challenge conference key even if he eavesdrops executions ofτ(maybe repetitive) conferences and corrupts a predefined number of users. Here, an eavesdropped conference may contain a corrupted user, who could be useful in learning personal secret keys of uncorrupted users. In the model of Blundo et al.(Comp J, 1999), an eavesdropped conference is required to be uncorrupted. We show that the former model is strictly stronger than the latter. The size of the protocol transcript is related to the efficiency of KAS. We show that if the protocol transcript of KAS has the same entropy as the conference key,then this scheme is no better than a certain key pre-distribution scheme(KPS). For a secure KAS, it is desired that the protocol transcript does not leak any information about a user’s personal secret key. We show that if this is true, then the underlying KAS is again no better than a certain KPS. For τ > 1, every previous τ-time KAS needs a global counter to maintain the number of conferences executed so far. We show that polynomially synthesizing d-independent KPS gives a d-time KAS without a global counter. A τ-time key agreement system (τ-time KAS) is an unconditionally secure key agreement where an attacker can not obtain any information about the challenge conference key even if eavesdrops executions of τ (maybe repetitive) conferences and corrupts a predefined number of users. In the model of Blundo et al. (Comp J, 1999), an eavesdropped conference may be necessary to be uncorrupted. We show that the former model is exactly stronger than the latter. The size of the protocol transcript is related to the efficiency of KAS. We show that if the protocol transcript of KAS has the same entropy as the conference key, then this scheme is no better than a certain key pre-distribution scheme (KPS). For a secure KAS, it is desired that the protocol transcript does not leak any information about a user’s personal secret key. We show that if this is true, then the un derlying KAS is again no better than a certain KPS. For τ> 1, every previous τ-time KAS needs a global counter to maintain the number of conferences performed so far. We show that polynomially synthesizing d-independent KPS gives a d-time KAS without a global counter.
其他文献
细胞色素P450(CYP)是动物体内代谢药物的重要的酶。CYP1A、3A和2E的诱导和抑制作用己被广泛研究,其诱导剂和抑制剂已经比较明了,但关于鱼类P450诱导剂和抑制剂对双氟沙星N-脱甲
学位
《国家中长期教育改革与发展纲要》把全面提高高等教育质量作为未来一段时间内我国高等教育的发展任务.而树立多样化的人才培养观念,改革教育质量评价体系,建立科学、多样的
本研究利用组织学、组织化学和免疫组织化学的技术对梭鱼仔鱼早期发育阶段的生长发育模式、鳍的发育、消化系统的发育以及间歇性饥饿对幼鱼消化道组织学及行为的影响进行了研
肌肉生长抑制素(myostatin,MSTN)是转化生长因子-β(transforming growth factor-β,TGF-β)超家族的一员,但又与TGF-β超家族其它成员的同源性很低,故又称为GDF-8(growthdif
该文从专属经济区制度和公海渔业制度这两方面,分析了《联合国海洋法公约》签定以后国际渔业法律制度的发展变化及其对世界海洋渔业带来的影响.简要分析了渔业管理中的搞入控
本文以新吉富罗非鱼幼鱼为研究对象,从鱼类营养学和能量学角度探讨饲料脂肪和L-肉碱对新吉富罗非鱼的生长、饲料利用、生化组成以及能量收支等的影响机制,研究不同脂肪和L-肉碱
鲍曼不动杆菌(Acinetobacter baumannii)广泛存在于自然界,常引起严重医院感染,是重症监护室(ICU)中一种常见条件致病菌,能通过土壤、水、器具传播,引起病人的多种严重感染如
在大肠杆菌BL21菌株中诱导表达pET-28a(+)-proPO,SDS-PAGE和Western-blotting分析,均能检测到一条分子量为79.4 kDa的特异性条带,与推导的融合蛋白理论分子量(82.4 kDa)基本
我国渔业在发展中受重产量、重地区、重近期发展观念的困扰,资源利用必然建立在过度开发利用和粗放经营基础之上,虽然年年保持高速增长,但在相当程度上已对资源特别是近海渔业生
本研究利用磁珠杂交筛选和数据库检索两种方法开发了西施舌(Coelomactra antiquata)、魁蚶(Scapharca broughtonii)和光棘球海胆(Strongylocentrotus nudus)三种重要无脊椎动