Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3 Hits in 4.1 sec

The Piggy Bank Cryptographic Trope [article]

Subhash Kak
2013 arXiv   pre-print
This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box.  ...  Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents of the box.  ...  The piggy bank trope Bob sends an empty locked piggy bank to Alice.  ... 
arXiv:1301.0313v1 fatcat:hfy2pj7t6jeang4tyosbziiece

Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography [article]

Subhash Kak
2014 arXiv   pre-print
The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties.  ...  Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol.  ...  We propose the use of the piggy bank idea in exchange of the relevant timing information. 4. THE PIGGY BANK TROPE In the piggy bank system, the box and the contents authenticate the parties.  ... 
arXiv:1411.3645v1 fatcat:vyaa77a6jfcadk5swbx2amy2fy

Survey of Key Distribution Schemes for Wireless Sensor Networks [article]

Pratik P. Chaphekar
2014 arXiv   pre-print
The survey includes the use of the piggy bank approach to cryptography in which part of the key is pre-distributed and the remainder is varied in the application.  ...  This survey includes the new approach of key distribution using the piggy bank method. Different Network architectures and different key pre-distribution schemes are described.  ...  The above steps can be shown pictorially as follows Figure 7 : 7 Figure 7: Piggy Bank Cryptographic Trope implementation  ... 
arXiv:1405.4286v1 fatcat:wo4esvudz5el3odptpyrryyoui