Private Communication System based on Bounded Storage Model

碩士 === 國立交通大學 === 資訊科學系所 === 92 === In pulic-key cyptosystems are based on computational assumptions(i.e. RSA assumption). But there is no restirction of computational power in the bounded storage model. It just limited the adversary’s storage. We can construct a encryption scheme by using this mode...

Full description

Bibliographic Details
Main Authors: Lin, Kun-Shan, 林坤杉
Other Authors: Tzeng, Wen-Guey
Format: Others
Language:zh-TW
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/10168180796748204600