๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

An efficient identity-based protocol for private matching

โœ Scribed by Sheng Zhong; Tingting Chen


Publisher
John Wiley and Sons
Year
2010
Tongue
English
Weight
135 KB
Volume
24
Category
Article
ISSN
1074-5351

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Efficient identity-based authenticated m
โœ Zuowen Tan ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 226 KB

Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the

Efficient identity-based security scheme
โœ Muhammad Bohio; Ali Miri ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 286 KB

Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that

An efficient protocol for the quantum pr
โœ Wen Liu; Yong-Bin Wang; Zheng-Tao Jiang ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 158 KB

We propose an efficient quantum protocol for comparing the equal information with the help of a semihonest third party (TP). Our protocol utilizes the triplet W states and the single-particle measurement. A precise proof of security of the protocol is presented. The security of this protocol with re