IJPAM: Volume 93, No. 6 (2014)
KEY EXCHANGE, PUBLIC KEY
School of Mathematics, Statistics & Applied Mathematics
National University of Ireland Galway
University Road, Galway, IRELAND
Abstract. General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultaneously.
Received: May 27, 2014
AMS Subject Classification: 15A99, 94A60
Key Words and Phrases: cryptography, key exchange, one-time
Download paper from here.
DOI: 10.12732/ijpam.v93i6.13 How to cite this paper?
Source: International Journal of Pure and Applied Mathematics
ISSN printed version: 1311-8080
ISSN on-line version: 1314-3395
Pages: 897 -
This work is licensed under the Creative Commons Attribution International License (CC BY).