A practical and secure communication protocol in the bounded storage model

Warning The system is temporarily closed to updates for reporting purpose.

Sunar, Berk and Savaş, Erkay (2005) A practical and secure communication protocol in the bounded storage model. In: 4th International Conference on Networking, ICN'05, Reunion Islands, France

Full text not available from this repository.


Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a unique private key encryption scheme called hyper-encryption which provides everlasting unconditional security. So far the work on the bounded storage model has been largely on the theoretical basis. In this paper, we make a first attempt to outline a secure communication protocol based on this model. We describe a protocol which defines means for successfully establishing and carrying out an encryption session and address potential problems such as protocol failures and attacks. Furthermore, we outline a novel method for authenticating and ensuring the integrity of a channel against errors. Keywords: Bounded storage model, hyper-encryption, information theoretical security, pervasive networks.

Item Type:Papers in Conference Proceedings
Subjects:Q Science > QA Mathematics
ID Code:1385
Deposited By:Erkay Savaş
Deposited On:19 Feb 2007 02:00
Last Modified:22 Feb 2010 22:05

Repository Staff Only: item control page