翻訳と辞書
Words near each other
・ Piggott National Guard Armory
・ Piggott Peninsula
・ Piggott Post Office
・ Piggott School District
・ Piggott, Arkansas
・ Piggotts
・ Piggs Peak
・ Piggs Peak Airfield
・ Piggsburg Pigs!
・ Piggville, Kentucky
・ Piggy
・ Piggy (Merrie Melodies)
・ Piggy (song)
・ Piggy bank
・ Piggy Bank (song)
Piggy bank cryptography
・ Piggy bun
・ Piggy D.
・ Piggy French
・ Piggy Piggy
・ Piggy Tales
・ Piggy Ward
・ Piggy-back (law)
・ PiggyBac Transposon System
・ Piggyback (transportation)
・ Piggyback attack
・ Piggyback Bandit
・ Piggyback basin
・ Piggybacking
・ Piggybacking (data transmission)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Piggy bank cryptography : ウィキペディア英語版
Piggy bank cryptography
Piggy bank cryptography is a digital emulation of a piggy bank. It uses an encrypted message as a carrier into which valuable secrets can be inserted and later recovered by the person who issued the message.
A typical protocol works as follows:〔Kak, S. The piggy bank cryptographic trope. Infocommunications Journal, vol. 6, pp. 22-25, March 2014.〕
# Bob, who wishes to obtain secret information from Alice, uses public key cryptography to encrypt some random data with his own public key. He sends the result to Alice.
# Alice creates a single-use key pair. She injects both her secret and her new decryption key into Bob's message. She then writes a signed note that describes what she has injected. She encrypts the note with her new encryption key, and sends the modified message and note to Bob.
# Bob decrypts the modified message to obtain both the secret and Alice's decryption key. He uses her decryption key to read the note and and verify that Alice sent the secret.
In this scheme, Bob does not necessarily require a public key from Alice, although he does require her to sign her note in such a way that he can verify her authorship.
Piggy bank cryptography has been proposed for authenticating parties to detect man-in-the-middle attack.〔Kak,S. Authentication using piggy bank approach to secure double-lock cryptography http://arxiv.org/abs/1411.3645〕 The piggy bank paradigm can be used to implement asymmetric as well as double-lock cryptography.〔Chodisetti, N. http://arxiv.org/abs/1406.2285〕
==References==


抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Piggy bank cryptography」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.