990 resultados para key innovations


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Globalisation‟ and the "global knowledge economy‟ have become some of the most common "buzzwords‟ in Australian business, economic, and social sectors in the past decade. Further, knowledge service exports are a growing sector for Australia that utilise complex technical and creative capacities, increasingly rely on virtual work innovations, require new socio-technical systems to establish and maintain effective client relationships in global contexts; and – along with other innovations in the electronic age – may require novel coping abilities on the part of both managers and their employees to achieve desired outcomes (Bandura, 2002). Accordingly, this paper overviews such trends. The paper also includes a research agenda which is a "work-in-progress‟ with a major global company, Shell (Australia); it highlights both the objectives and proposed methodology of the study; it also outlines anticipated key benefits arising from the research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.