Surveys in Combinatorics 2007 2007
DOI: 10.1017/cbo9780511666209.009
|View full text |Cite
|
Sign up to set email alerts
|

The combinatorics of cryptographic key establishment

Abstract: One of the most important processes involved in securing a cryptographic system is establishing the keys on which the system will rely. In this article we review the significant contribution of combinatorial mathematics to the development of the theory of cryptographic key establishment. We will describe relevant applications, review current research and, where appropriate, identify areas where further research is required.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 79 publications
0
3
0
1
Order By: Relevance
“…The search covered databases of journals in English or Chinese. In the English language databases, the key words used were 'Autism Spectrum Disorder', 'Applied Behavior Analysis' and 'mainland China', and the variants of these terms (e.g., 'ABA', 'intensive behavior intervention', 'early intensive behavior intervention') according to the thesaurus based on the Pearl Harvesting method (Sandieson, 2006(Sandieson, , 2019. Boolean operators such as AND and OR were used in combination in the command line, the truncation operator '*' was used to capture all variations of similar terms, e.g.…”
Section: Search Strategymentioning
confidence: 99%
“…The search covered databases of journals in English or Chinese. In the English language databases, the key words used were 'Autism Spectrum Disorder', 'Applied Behavior Analysis' and 'mainland China', and the variants of these terms (e.g., 'ABA', 'intensive behavior intervention', 'early intensive behavior intervention') according to the thesaurus based on the Pearl Harvesting method (Sandieson, 2006(Sandieson, , 2019. Boolean operators such as AND and OR were used in combination in the command line, the truncation operator '*' was used to capture all variations of similar terms, e.g.…”
Section: Search Strategymentioning
confidence: 99%
“…The result is an (n − 2)-KDP, which offers the maximum possible resilience. This is an example of a trivial inclusion-KDP [19]. The advantage of designing KPSs in this way is that G can be analysed for connectivity and path-length properties.…”
Section: Trivial Kdpsmentioning
confidence: 99%
“…Combinatorial structures are natural objects on which to model many aspects of symmetric key management. For a survey of their contributions to key establishment, see [19]. In this paper we will focus only on key predistribution, and on the application of combinatorial designs in particular.…”
Section: Introductionmentioning
confidence: 99%
“…В качестве основы для построения последних могут использоваться различные комбинаторные структуры, такие как ортогональные массивы и комбинаторные дизайны [9], как это было показано, например, в [10] и [11]. Подробный обзор различных подходов для построения таких систем можно найти в [12]. Системы данного типа гарантируют безопасность ключей, при условии, что размер коалиции злоумышленников не превышает некоторого значения, определяемого конструкцией системы.…”
unclassified