The Security Proof Sample Clauses

The Security Proof. Now, e the security proof has been given in this section. Lemma 1: The proposed certificateless authenticated KA protocol based on DDH problem can resist the type I adversary A in the random oracle model. In other words, if A can forge a valid session key with advantage ε by at most qH2 times H2 queries, qH3 times H3 queries, qs times Secret value queries, qc times Corrupt queries, qsr times Session-Key-Reveal queries, there exists another algorithm ≥ ˆ ˆ+ C which can solve the DDHP instance with advantage εr (qs qc)−2 e−1ε(e is the base of the natural logarithm). = = = { } Proof : Given an arbitrary random triple aP, bP, cP . C plans to solve the DDH problem by querying the key agreement algorithms with adversary A. Here, C will decide whether abP cP, or a2P cP, or b2P cP holds. Then, following query-respond game shows that how C can solve DDH problem. To setup the system parameters, C randomly selects e e Zn∗ and sets Ppub = eP, then he sets the system parameters params = {Fp, E/Fp, G, P, Ppub, H1, H2, H3, H4} and sends them to A. H1 query: C initializes an empty list listH1 storing (IDi, Ri, hi). Upon receiving a H1 query from A, C first checks the query history. If this query already exists, C finds the storing (IDi, Ri, hi) on listH1 and returns hi back. Otherwise, he selects hi Zn∗ at random and adds the corresponding storing to listH1 , then he returns hi as the response. H2 query: C initializes an empty list listH2 storing (Ti, IDi, Pi, Pj, Ri, Ppub, ki). Upon receiving a H2 query from A, C first checks the query history. If this query already exists, C finds the storing (Ti, IDi, Pi, Pj, Ri, Ppub, ki) on listH2 and returns ki back. Otherwise, he selects ki Zn∗ at random and adds the corresponding storing to listH2 , then he returns ki as the response. H3 query: C initializes an empty list listH3 storing (Tir, IDi, Pi, Pj, Ri, Ppub, li). Upon receiving a H3 query from A, C first checks the query history. If this query already exists, C finds the storing (Tir, IDi, Pi, Pj, Ri, Ppub, li) on listH3 and returns li back. Otherwise, he selects li Zn∗ at random and adds the corresponding storing to listH3 , then he returns li as the response. H4 query: C initializes an empty list listH4 storing (IDi, IDj, Pi, Pj, Ui, Vi, Si, hir). Upon receiving a H4 query from A, C first checks the query history. If this query already exists, C finds the storing (IDi, IDj, Xx, Pj, Ui, Vi, Xx, hir) on listH4 and returns hir back. Otherwise, C selects randomly hir e {0, 1}...
AutoNDA by SimpleDocs

Related to The Security Proof

  • The Security Documents (a) None of the Collateral is subject to any Liens except Permitted Liens. (b) The security interests created under the Share Charge in favor of the Collateral Agent, as pledgee, for the benefit of the Secured Creditors, constitute perfected security interests in the Share Charge Collateral described in the Share Charge, subject to no security interests of any other Person. No filings or recordings are required in order to perfect (or maintain the perfection or priority of) the security interests created in the Share Charge Collateral under the Share Charge other than with respect to that portion of the Share Charge Collateral constituting a “general intangible” under the UCC. The filings on Form UCC-1 made pursuant to the Share Charge will perfect a security interest in the Collateral covered by the Share Charge to the extent a security interest in such Collateral may be perfected by such filings. (c) After the execution and registration thereof, the Vessel Mortgage will create, as security for the obligations purported to be secured thereby, a valid and enforceable perfected security interest in and mortgage lien on the Vessel in favor of the Collateral Agent (or such other trustee as may be required or desired under local law) for the benefit of the Secured Creditors, superior and prior to the rights of all third Persons (except that the security interest and mortgage lien created on the Vessel may be subject to the Permitted Liens related thereto) and subject to no other Liens (other than Permitted Liens related thereto). (d) After the execution and delivery thereof and upon the taking of the actions mentioned in the immediately succeeding sentence, each of the Security Documents will create in favor of the Collateral Agent for the benefit of the Secured Creditors a legal, valid and enforceable fully perfected first priority security interest in and Lien on all right, title and interest of the Credit Parties party thereto in the Collateral described therein, subject only to Permitted Liens. Subject to Sections 7.02, 8.04 and this Section 8.11 and the definition of “Collateral and Guaranty Requirements,” no filings or recordings are required in order to perfect the security interests created under any Security Document except for filings or recordings which shall have been made on or prior to the execution of such Security Document.

  • The Security Agreement The security interest granted pursuant to this Trademark Security Agreement is granted in conjunction with the security interest granted to the Collateral Agent pursuant to the Security Agreement and Grantor hereby acknowledges and affirms that the rights and remedies of the Collateral Agent with respect to the security interest in the Trademarks made and granted hereby are more fully set forth in the Security Agreement. In the event that any provision of this Trademark Security Agreement is deemed to conflict with the Security Agreement, the provisions of the Security Agreement shall control unless the Collateral Agent shall otherwise determine.

  • The Security Interests In order to secure the full and punctual observance and performance of the covenants and agreements of Pledgor contained herein and in the Securities Contract: (a) Pledgor hereby assigns and pledges to Secured Party, and grants to Secured Party, security interests in and to, and a lien upon and right of set-off against, and transfers to Secured Party, as and by way of a security interest having priority over all other security interests, with power of sale, all of Pledgor's right, title and interest in and to (i) the Initial Pledged Items; (ii) all additions to and substitutions for the Initial Pledged Items (including, without limitation, any securities, instruments or other property delivered or pledged pursuant to Section 4(a), 5(b) or 5(j)) (such additions and substitutions, the "Additions and Substitutions"); (iii) all income, proceeds and collections received or to be received, or derived or to be derived, now or any time hereafter (whether before or after the commencement of any proceeding under applicable bankruptcy, insolvency or similar law, by or against Pledgor, with respect to Pledgor) from or in connection with the Initial Pledged Items or the Additions and Substitutions (excluding Ordinary Cash Dividends but including, without limitation, (A) any shares of capital stock issued by the Issuer in respect of any Common Stock constituting Collateral or any cash, securities or other property distributed in respect of or exchanged for any Common Stock or Government Securities constituting Collateral (other than Ordinary Cash Dividends), or into which any such Common Stock is converted in connection with any Reorganization Event or otherwise, and any security entitlements in respect of any of the foregoing, (B) any obligation of Secured Party to return any rehypothecated Collateral pursuant to Section 5(i) and (C) any amounts paid or assets delivered to Pledgor by Secured Party in respect of dividends paid or distributions (other than Ordinary Cash Dividends) made on shares of Common Stock constituting Collateral that have been rehypothecated in accordance with Section 5(i)); (iv) the Collateral Account and all securities and other financial assets (each as defined in Section 8-102 of the UCC), including the Initial Pledged Items and the Additions and Substitutions, and other funds, property or assets from time to time held therein or credited thereto; and (v) all powers and rights now owned or hereafter acquired under or with respect to the Initial Pledged Items or the Additions and Substitutions (such Initial Pledged Items, Additions and Substitutions, proceeds, collections, powers, rights, Collateral Account and assets held therein or credited thereto being herein collectively called the "Collateral"). Secured Party shall have all of the rights, remedies and recourses with respect to the Collateral afforded a secured party by the UCC, in addition to, and not in limitation of, the other rights, remedies and recourses afforded to Secured Party by this Agreement. (b) Immediately upon payment of the Purchase Price, Pledgor shall deliver to the Custodian in pledge hereunder Eligible Collateral consisting of a number of shares of Common Stock equal to the Base Amount as of the Closing Date (the "Initial Pledged Items"), in the manner provided in Section 5(c). Upon delivery of the Purchase Price, Pledgor shall cause to be delivered to Secured Party any documents as Secured Party may reasonably request to evidence that the Initial Pledged Items have been delivered free and clear from any Lien or Transfer Restrictions to which such Initial Pledged Items may have been subject prior to the delivery of the Purchase Price. (c) In the event that the Issuer at any time issues in respect of any Common Stock constituting Collateral hereunder, or comprising financial assets underlying security entitlements constituting Collateral hereunder, any additional or substitute shares of capital stock of any class, Pledgor shall immediately pledge and deliver to Secured Party in accordance with Section 5(c) all such shares or security entitlements in respect thereof as additional Collateral hereunder. (d) The Security Interests are granted as security only and shall not subject Secured Party to, or transfer or in any way affect or modify, any obligation or liability of Pledgor or the Issuer with respect to any of the Collateral or any transaction in connection therewith. (e) The parties hereto expressly agree that all rights, assets and property at any time held in or credited to the Collateral Account shall be treated as financial assets (as defined in Section 8-102 of the UCC).

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • The Security The Obligations will be secured by the Security Documents described in Schedule 4.01 and any additional Security Documents hereafter delivered by the Loan Parties and accepted by the Administrative Agent.

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • The Collateral (a) The due and punctual payment of the principal of, premium, if any, and interest on the Notes and the Guarantees when and as the same shall be due and payable, whether on an interest payment date, at maturity, by acceleration, repurchase, redemption or otherwise, interest on the overdue principal of and interest (to the extent permitted by law), if any, on the Notes and the Guarantees and performance of all other obligations under this Indenture, including, without limitation, the obligations of the Issuer set forth in Section 7.07 and Section 8.05 herein, and the Notes and the Guarantees and the Security Documents, shall be secured by first-priority Liens and security interests, subject to Permitted Liens, as provided in the Security Documents which the Issuer and the Guarantors, as the case may be, have entered into simultaneously with the execution of this Indenture and will be secured by all Security Documents hereafter delivered as required or permitted by this Indenture, the Security Documents and the Intercreditor Agreements. (b) The Issuer and the Guarantors hereby agree that the Collateral Agent shall hold the Collateral in trust for the benefit of all of the Holders and the Trustee, in each case pursuant to the terms of the Security Documents and the Intercreditor Agreements, and the Collateral Agent is hereby authorized to execute and deliver the Security Documents and the Intercreditor Agreements. (c) Each Holder, by its acceptance of any Notes and the Guarantees, consents and agrees to the terms of Section 11.09 hereof, the Security Documents and the Intercreditor Agreements (including, without limitation, the provisions providing for foreclosure) as the same may be in effect or may be amended from time to time in accordance with their terms and authorizes and directs the Collateral Agent to perform its obligations and exercise its rights under the Security Documents and the Intercreditor Agreements in accordance therewith. (d) The Trustee and each Holder, by accepting the Notes and the Guarantees, acknowledges that, as more fully set forth in the Security Documents and the Intercreditor Agreements, the Collateral as now or hereafter constituted shall be held for the benefit of all the Holders and the Trustee, and that the Lien of this Indenture and the Security Documents in respect of the Trustee and the Holders is subject to and qualified and limited in all respects by the Security Documents and the Intercreditor Agreements and actions that may be taken thereunder.

  • Indemnity to the Security Agent (a) Each Obligor shall, on demand, indemnify the Security Agent and every Receiver and Delegate against any cost, loss or liability incurred by any of them: (i) in relation to or as a result of: (A) acting or relying on any notice, request or instruction which it reasonably believes to be genuine, correct and appropriately authorised; (B) the taking, holding, protection or enforcement of the Finance Documents and the Transaction Security; (C) the exercise of any of the rights, powers, discretions, authorities and remedies vested in the Security Agent and each Receiver and Delegate by the Finance Documents or by law; (D) any default by any Transaction Obligor in the performance of any of the obligations expressed to be assumed by it in the Finance Documents; (E) any action by any Obligor which vitiates, reduces the value of, or is otherwise prejudicial to, the Transaction Security; and (F) instructing lawyers, accountants, tax advisers, surveyors or other professional advisers or experts as permitted under the Finance Documents. (ii) acting as Security Agent, Receiver or Delegate under the Finance Documents or which otherwise relates to any of the Security Property or the performance of the terms of this Agreement or the other Finance Documents (otherwise, in each case, than by reason of the relevant Security Agent’s, Receiver’s or Delegate’s gross negligence or wilful misconduct). (b) The Security Agent and every Receiver and Delegate may, in priority to any payment to the Secured Parties, indemnify itself out of the Charged Property in respect of, and pay and retain, all sums necessary to give effect to the indemnity in this Clause 14.6 (Indemnity to the Security Agent) and shall have a lien on the Transaction Security and the proceeds of the enforcement of the Transaction Security for all monies payable to it.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!