Sciweavers

ICN
2005
Springer

A Practical and Secure Communication Protocol in the Bounded Storage Model

14 years 5 months ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a unique private key encryption scheme called hyper-encryption which provides everlasting unconditional security. So far the work on the bounded storage model has been largely on the theoretical basis. In this paper, we make a first attempt to outline a secure communication protocol based on this model. We describe a protocol which defines means for successfully establishing and carrying out an encryption session and address potential problems such as protocol failures and attacks. Furthermore, we outline a novel method for authenticating and ensuring the integrity of a channel against errors. Key Words: Bounded storage model, hyper-encryption, information theoretical security, pervasive networks.
Erkay Savas, Berk Sunar
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where ICN
Authors Erkay Savas, Berk Sunar
Comments (0)