期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Improved key exchange protocol for three-party based on verifier authentication 被引量:4
1
作者 柳秀梅 周福才 常桂然 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期322-324,共3页
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w... To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient. 展开更多
关键词 key exchange for three-party password-based authentication VERIFIER
在线阅读 下载PDF
Classical Communication Cost and Remote Preparation of Multi-qubit with Three-Party 被引量:3
2
作者 DAI Hong-Yi ZHANG Ming KUANG Le-Man 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第7期73-76,共4页
We present a scheme for probabilistic remote preparation of multi-qubit with three-party from a sender to either of two receivers. The quantum channel is composed of a partial entangled tripartite GHZ state. We obtain... We present a scheme for probabilistic remote preparation of multi-qubit with three-party from a sender to either of two receivers. The quantum channel is composed of a partial entangled tripartite GHZ state. We obtain the successful totM probability of the scheme in the general case and special case, respectively. We also calculate total classical communication cost required in the RSP process with three-party in the general case and special case, respectively. 展开更多
关键词 remote state preparation multi-qubit classical communication cost three-party
在线阅读 下载PDF
High-capacity three-party quantum secret sharing with superdense coding 被引量:2
3
作者 顾斌 李传起 +1 位作者 徐飞 陈玉林 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第11期4690-4694,共5页
This paper presents a scheme for high-capacity three-party quantum secret sharing with quantum superdense coding, following some ideas in the work by Liuet al (2002 Phys. Rev. A 65 022304) and the quantum secret sha... This paper presents a scheme for high-capacity three-party quantum secret sharing with quantum superdense coding, following some ideas in the work by Liuet al (2002 Phys. Rev. A 65 022304) and the quantum secret sharing scheme by Deng et al (2008 Phys. Lett. A 372 1957). Instead of using two sets of nonorthogonal states, the boss Alice needs only to prepare a sequence of Einstei^Podolsky-l^osen pairs in d-dimension. The two agents Bob and Charlie encode their information with dense coding unitary operations, and security is checked by inserting decoy photons. The scheme has a high capacity and intrinsic efficiency as each pair can carry 21bd bits of information, and almost all the pairs can be used for carrying useful information. 展开更多
关键词 quantum secret sharing three-party HIGH-CAPACITY superdense coding
原文传递
Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1
4
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 authentication CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
Three-party reference frame independent quantum key distribution protocol 被引量:1
5
作者 Comfort Sekga Mhlambululi Mafu 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第12期195-205,共11页
We present a three-party reference frame independent quantum key distribution protocol which can be implemented without any alignment of reference frames between the sender and the receiver.The protocol exploits entan... We present a three-party reference frame independent quantum key distribution protocol which can be implemented without any alignment of reference frames between the sender and the receiver.The protocol exploits entangled states to establish a secret key among three communicating parties.We derive the asymptotic key rate for the proposed protocol against collective attacks and perform a finite-size key security analysis against general attacks in the presence of statistical fluctuations.We investigate the impact of reference frame misalignment on the stability of our protocol,and we obtain a transmission distance of 180 km,200 km,and 230 km for rotation of reference framesβ=π/6,β=π/8 andβ=0,respectively.Remarkably,our results demonstrate that our proposed protocol is not heavily affected by an increase in misalignment of reference frames as the achievable transmission distances are still comparable to the case where there is no misalignment in reference frames(whenβ=0).We also simulate the performance of our protocol for a fixed number of signals.Our results demonstrate that the protocol can achieve an effective key generation rate over a transmission distance of about 120 km with realistic 107 finite data signals and approximately achieve 195 km with 109 signals.Moreover,our proposed protocol is robust against noise in the quantum channel and achieves a threshold error rate of 22.7%. 展开更多
关键词 three-party reference frame independent quantum key distribution finite-size key security
原文传递
Efficient and secure three-party authenticated key exchange protocol for mobile environments 被引量:1
6
作者 Chih-ho CHOU Kuo-yu TSAI +1 位作者 Tzong-chen WU Kuo-hui YEH 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2013年第5期347-355,共9页
Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing ell... Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing elliptic curve cryptosystems. However, Tan (2010) pointed out that Yang and Chang (2009)'s protocol cannot withstand impersonation and parallel attacks, and further proposed an enhanced protocol to resist these attacks. This paper demonstrates that Tan (2010)'s approach still suffers from impersonation attacks, and presents an efficient and secure three-party authenticated key exchange protocol to overcome shown weaknesses. 展开更多
关键词 three-party Key exchange AUTHENTICATION Mobile environments
原文传递
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
7
作者 Chandrashekhar Meshram Agbotiname Lucky Imoize +3 位作者 Sajjad Shaukat Jamal Parkash Tambare Adel R.Alharbi Iqtadar Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1373-1389,共17页
The Human-Centered Internet of Things(HC-IoT)is fast becoming a hotbed of security and privacy concerns.Two users can establish a common session key through a trusted server over an open communication channel using a ... The Human-Centered Internet of Things(HC-IoT)is fast becoming a hotbed of security and privacy concerns.Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement.Most of the early authenticated key agreement systems relied on pairing,hashing,or modular exponentiation processes that are computationally intensive and cost-prohibitive.In order to address this problem,this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps.The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table.The projected security scheme utilized a hash function,which works well for the resource-limited HC-IoT architectures.Test results show that our new technique is resistant to password guessing attacks since it does not use a password.Furthermore,our approach provides users with comprehensive privacy protection,ensuring that a user forgery attack causes no harm.Finally,our new technique offers better security features than the techniques currently available in the literature. 展开更多
关键词 three-party authenticated key agreement ANONYMITY fractional chaotic maps Chebyshev polynomial password table human-centered internet of things(HC-IoT)
在线阅读 下载PDF
PUMA: Secure inference of LLaMA-7B in five minutes
8
作者 Ye Dong Wen-Jie Lu +8 位作者 Yancheng Zheng Haoqi Wu Derun Zhao Jin Tan Zhicong Huang Cheng Hong Tao Wei Wen-Guang Chen Jianying Zhou 《Security and Safety》 2025年第4期145-168,共24页
Transformer models(e.g., Bert and GPT) have shown their dominance in machine learning tasks. Many cloud companies have begun to provide services based on Transformer models, examples include translation and text-speec... Transformer models(e.g., Bert and GPT) have shown their dominance in machine learning tasks. Many cloud companies have begun to provide services based on Transformer models, examples include translation and text-speech conversion. However, such a service inevitably requires access to the client's data, which might contain sensitive information. Theoretically, running the services under secure multi-party computation(MPC)could protect clients' privacy. However, current MPC frameworks are still limited in terms of model performance, efficiency, deployment, and functionality, especially when facing complex Transformer models. To this end, we propose an MPC framework Pum A to enable secure and efficient Transformer model inference. We first design high-quality approximations for the bottleneck functions in Transformers such as GELU and Softmax, reducing about20-76% computation and communication costs than state-of-the-art works without performance drop. Then, we provide concrete instantiations for secure Embedding and Layer Norm.These implementations produce correct results and integrate compatible system architectures of cleartext Transformer models. Finally, we conducted extensive experiments on six popular benchmarks: text classification/generation/summarization/translation, audio-to-text,and image-to-text. Results show that Pum A can finish most tasks in several minutes, with comparable model performance(e.g., accuracy) as cleartext, and even evaluate LLa MA-7B in less than 5 minutes to generate 1 token. 展开更多
关键词 PRIVACY Security Secure three-party Computation Privacy-Preserving Machine Learning Large Language Models
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部