期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
The NP-Complete Face of Information-Theoretic Security
1
作者 Stefan Rass Peter Schartner 《Computer Technology and Application》 2011年第11期893-905,共13页
The problem of perfectly secure communication has enjoyed considerable theoretical treatment over the last decades. Results in this area include the identification of multipath transmission as a necessary ingredient, ... The problem of perfectly secure communication has enjoyed considerable theoretical treatment over the last decades. Results in this area include the identification of multipath transmission as a necessary ingredient, as well as quantum key distribution (QKD), which can perfectly protect direct lines, Combining the advantages of the quantum and multipath transmission paradigm, as well as rigorously analyzing the security of such combined techniques, is possible by virtue of game-theory. Based on a game-theoretic measure of channel vulnerability, the authors prove the problem of setting up infrastructures for QKD-based multipath transmission to be NP-complete. The authors consider the problem in two flavors, both being computationally hard. Remarkably, the authors' results indicate that the P-vs-NP-question is only of minor effect for confidentiality, because either nowadays public-key cryptosystems remain secure (in case that P, NP) or infrastructures facilitating perfectly confidential communication can be constructed efficiently (in case that P = NP). 展开更多
关键词 Risk management CRYPTOGRAPHY complexity theory NP-COMPLETENESS network security
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部