A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Piggy Bank Cryptographic Trope
[article]
2013
arXiv
pre-print
This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box. ...
Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents of the box. ...
The piggy bank trope Bob sends an empty locked piggy bank to Alice. ...
arXiv:1301.0313v1
fatcat:hfy2pj7t6jeang4tyosbziiece
Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography
[article]
2014
arXiv
pre-print
The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties. ...
Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol. ...
We propose the use of the piggy bank idea in exchange of the relevant timing information. 4. THE PIGGY BANK TROPE In the piggy bank system, the box and the contents authenticate the parties. ...
arXiv:1411.3645v1
fatcat:vyaa77a6jfcadk5swbx2amy2fy
Survey of Key Distribution Schemes for Wireless Sensor Networks
[article]
2014
arXiv
pre-print
The survey includes the use of the piggy bank approach to cryptography in which part of the key is pre-distributed and the remainder is varied in the application. ...
This survey includes the new approach of key distribution using the piggy bank method. Different Network architectures and different key pre-distribution schemes are described. ...
The above steps can be shown pictorially as follows
Figure 7 : 7 Figure 7: Piggy Bank Cryptographic Trope implementation ...
arXiv:1405.4286v1
fatcat:wo4esvudz5el3odptpyrryyoui