VERIFIABLE, LEAK-RESISTANT AUTHENTICATION

user-5f8cf9244c775ec6fa691c99(2019)

引用 214|浏览32
暂无评分
摘要
Methods and devices to encrypt and decrypt sensitive data to in a manner that provides secunty from external monitoring attacks is disclosed The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key denved from the base key and a message identifier to create a set of encrypted segments The encrypting device uses the base cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key The decrypting device, upon receiving an encrypted segments uses validators to verify the message identifier and that the encrypted segment are unmodified.
更多
查看译文
关键词
Encryption,Key (cryptography),Identifier,Verifiable secret sharing,Authentication,Cryptography,Computer network,Computer science
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要