24小时热门版块排行榜    

查看: 157  |  回复: 2
本帖产生 1 个 ,点击这里进行查看

zhuhf

禁虫 (正式写手)

本帖内容被屏蔽

» 猜你喜欢

已阅   关注TA 给TA发消息 送TA红花 TA的回帖

mhhhwcf059

新虫 (著名写手)

sunshan4379: 屏蔽内容, 求助帖严禁灌水 2017-09-24 16:13:58
本帖内容被屏蔽

2楼2017-09-23 13:13:05
已阅   关注TA 给TA发消息 送TA红花 TA的回帖

baiyuefei

版主 (文学泰斗)

风雪

优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主优秀版主优秀版主

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhuhf: 金币+30, ★★★★★最佳答案 2017-09-23 14:45:02
sunshan4379: LS-EPI+1, 感谢应助! 2017-09-24 16:14:10
Simple and universal construction for round-optimal password authenticated key exchange towards quantum-resistant
Accession number: 20172803925113
Authors: Zhu, Hongfeng 1   ; Geng, Shuai 1  
Author affiliation : 1 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; P.C 110034, China
Source title: Journal of Information Hiding and Multimedia Signal Processing
Abbreviated source title: J. Inf. Hiding Multimedia Signal Proces.
Volume: 8
Issue: 4
Issue date: 2017
Publication Year: 2017
Pages: 798-807
Language: English
ISSN: 20734212
E-ISSN: 20734239
Document type: Journal article (JA)
Publisher: Ubiquitous International
Abstract: Since quantum computers came on the scene, the world has changed greatly, especially related to cryptography. Public key cryptosystem, particularly RSA cryptosystem cant resist the quantum computers attack, so some quantum-resistant schemes have been proposed mainly based on quantum key distribution (QKD) method or new resistance to quantum algorithms. Recently, Jonathan et al (2013) presents two password-based authenticated key exchange (PAKE) protocols which make the communication reduce to one-round. At the same time Jonathans protocols achieve the mutual authentication and agreement the session key by constructing smooth projective hash functions. However Jonathans two protocols are subjected to quantum attacks, and there are so many time-consuming arithmetics just only for achieving a smooth projective hash function in Jonathans two protocols. Based on these motivations, this paper firstly proposes a provably secure and flexible one-round PAKE scheme based on elliptic curve isogenies. Compared with Jonathans two protocols, the results show that our one-round PAKE scheme can not only refrain from consuming modular exponential computing and scalar multiplication, but is also robust to resist quantum attacks. Finally we give the provable security of our scheme. © 2017, Ubiquitous International. All rights reserved.
Number of references: 25
Main heading: Quantum cryptography
Controlled terms: Aluminum alloys -  Authentication -  Cryptography -  Geometry -  Hash functions -  Public key cryptography -  Quantum computers -  Quantum theory
Uncontrolled terms: Authenticated key exchange -  Elliptic curve -  Key exchange -  Password-authenticated key exchange -  Public key cryptosystems -  Quantum-resistant -  Smooth projective hash functions -  Universal constructions
Classification code: 541.2Aluminum Alloys  -  722Computer Systems and Equipment  -  723Computer Software, Data Handling and Applications  -  921Mathematics  -  931.4Quantum Theory; Quantum Mechanics
Funding Details: Number;  Acronym;  Sponsor:  201602680;  NSFC;  National Natural Science Foundation of China  
Database: Compendex
Compilation and indexing terms, © 2017 Elsevier Inc.
3楼2017-09-23 14:40:37
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 zhuhf 的主题更新
信息提示
请填处理意见