Tieming Chen, Rongrong Jiang
Aug 24, 2007
Citations
2
Citations
Journal
Third International Conference on Natural Computation (ICNC 2007)
Abstract
Two neural networks with the common input vector can finally synchronize their weight vectors by output- based mutual learning. It can be well utilized to negotiate secure information over a public channel. Designing security protocols based on such synchronized neural network model is quite advantageous for its low-cost and high-performance. In this paper, we at first analyze and optimize the interacting network neurl, then present a cryptography-oriented secure parity model and implement the performance simulations. As an instance, a novel key agreement protocol design scenario is finally proposed.