Sunar, Berk and Savaş, Erkay (2005) A practical and secure communication protocol in the bounded storage model. In: 4th International Conference on Networking, ICN'05, Reunion Islands, France
Full text not available from this repository. (Request a copy)Abstract
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a unique private key encryption scheme called hyper-encryption which provides everlasting unconditional security. So far the work on the bounded storage model has been largely on the theoretical basis. In this paper, we make a first attempt to outline a secure communication protocol based on this model. We describe a protocol which defines means for successfully establishing and carrying out an encryption session and address potential problems such as protocol failures and attacks. Furthermore, we outline a novel method for authenticating and ensuring the integrity of a channel against errors.
Keywords: Bounded storage model, hyper-encryption, information theoretical security, pervasive networks.
Item Type: | Papers in Conference Proceedings |
---|---|
Subjects: | Q Science > QA Mathematics |
Divisions: | Faculty of Engineering and Natural Sciences |
Depositing User: | Erkay Savaş |
Date Deposited: | 19 Feb 2007 02:00 |
Last Modified: | 26 Apr 2022 08:35 |
URI: | https://research.sabanciuniv.edu/id/eprint/1385 |