A practical and secure communication protocol in the bounded storage model

Warning The system is temporarily closed to updates for reporting purpose.

Sunar, Berk and Savaş, Erkay (2005) A practical and secure communication protocol in the bounded storage model. In: 4th International Conference on Networking, ICN'05, Reunion Islands, France

Full text not available from this repository. (Request a copy)

Abstract

Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a unique private key encryption scheme called hyper-encryption which provides everlasting unconditional security. So far the work on the bounded storage model has been largely on the theoretical basis. In this paper, we make a first attempt to outline a secure communication protocol based on this model. We describe a protocol which defines means for successfully establishing and carrying out an encryption session and address potential problems such as protocol failures and attacks. Furthermore, we outline a novel method for authenticating and ensuring the integrity of a channel against errors. Keywords: Bounded storage model, hyper-encryption, information theoretical security, pervasive networks.
Item Type: Papers in Conference Proceedings
Subjects: Q Science > QA Mathematics
Divisions: Faculty of Engineering and Natural Sciences
Depositing User: Erkay Savaş
Date Deposited: 19 Feb 2007 02:00
Last Modified: 26 Apr 2022 08:35
URI: https://research.sabanciuniv.edu/id/eprint/1385

Actions (login required)

View Item
View Item