Matches in DBpedia 2015-10 for { <http://dbpedia.org/resource/Piggy_bank_cryptography> ?p ?o }
Showing triples 1 to 30 of
30
with 100 triples per page.
- Piggy_bank_cryptography abstract "Piggy bank cryptography is a digital emulation of a piggy bank. It uses an encrypted message as a carrier into which valuable secrets can be inserted and later recovered by the person who issued the message.A typical protocol works as follows: Bob, who wishes to obtain secret information from Alice, uses public key cryptography to encrypt some random data with his own public key. He sends the result to Alice. Alice creates a single-use key pair. She injects both her secret and her new decryption key into Bob's message. She then writes a signed note that describes what she has injected. She encrypts the note with her new encryption key, and sends the modified message and note to Bob. Bob decrypts the modified message to obtain both the secret and Alice's decryption key. He uses her decryption key to read the note and and verify that Alice sent the secret.In this scheme, Bob does not necessarily require a public key from Alice, although he does require her to sign her note in such a way that he can verify her authorship.Piggy bank cryptography has been proposed for authenticating parties to detect man-in-the-middle attack. The piggy bank paradigm can be used to implement asymmetric as well as double-lock cryptography.".
- Piggy_bank_cryptography wikiPageID "45250689".
- Piggy_bank_cryptography wikiPageLength "1744".
- Piggy_bank_cryptography wikiPageOutDegree "9".
- Piggy_bank_cryptography wikiPageRevisionID "680095134".
- Piggy_bank_cryptography wikiPageWikiLink Alice_and_Bob.
- Piggy_bank_cryptography wikiPageWikiLink Asymmetric_key_algorithm.
- Piggy_bank_cryptography wikiPageWikiLink Category:Banking_technology.
- Piggy_bank_cryptography wikiPageWikiLink Category:Cryptographic_protocols.
- Piggy_bank_cryptography wikiPageWikiLink Cryptography.
- Piggy_bank_cryptography wikiPageWikiLink Key_pair.
- Piggy_bank_cryptography wikiPageWikiLink Man-in-the-middle_attack.
- Piggy_bank_cryptography wikiPageWikiLink Piggy_bank.
- Piggy_bank_cryptography wikiPageWikiLink Public-key_cryptography.
- Piggy_bank_cryptography wikiPageWikiLink Public_key_cryptography.
- Piggy_bank_cryptography wikiPageWikiLinkText "Piggy bank cryptography".
- Piggy_bank_cryptography hasPhotoCollection Piggy_bank_cryptography.
- Piggy_bank_cryptography wikiPageUsesTemplate Template:Crypto-stub.
- Piggy_bank_cryptography wikiPageUsesTemplate Template:Reflist.
- Piggy_bank_cryptography subject Category:Banking_technology.
- Piggy_bank_cryptography subject Category:Cryptographic_protocols.
- Piggy_bank_cryptography hypernym Emulation.
- Piggy_bank_cryptography type Software.
- Piggy_bank_cryptography comment "Piggy bank cryptography is a digital emulation of a piggy bank. It uses an encrypted message as a carrier into which valuable secrets can be inserted and later recovered by the person who issued the message.A typical protocol works as follows: Bob, who wishes to obtain secret information from Alice, uses public key cryptography to encrypt some random data with his own public key. He sends the result to Alice. Alice creates a single-use key pair.".
- Piggy_bank_cryptography label "Piggy bank cryptography".
- Piggy_bank_cryptography sameAs m.012r4x_p.
- Piggy_bank_cryptography sameAs Q20310956.
- Piggy_bank_cryptography sameAs Q20310956.
- Piggy_bank_cryptography wasDerivedFrom Piggy_bank_cryptography?oldid=680095134.
- Piggy_bank_cryptography isPrimaryTopicOf Piggy_bank_cryptography.