Magnifying computing gaps establishing encrypted communication over unidirectional channels

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Consider two, not necessarily identical, powerful computers or computer-grids connected by a unidirectional communication link that should transfer a long stream of information in the presence of a listening adversary that is slightly weaker. We present schemes that enhance the computation strength gap between the powerful computers and the adversary. In other words, the gap between the amount of information decrypted by the adversary and the information decrypted by the receiver grows with time. We also suggest schemes based on the shortest vector problem in which only the receivers are computationally powerful. The scheme is self-stabilizing in the sense that it can establish a security level without relying on (previously distributed private keys that are part of) the state. The iterative nested approach suggested, can be used for enhancing the security of the classical protocol of Ralph Merkle [19]. Several applications for sensor networks and for secure communication with survivors are suggested.

Original languageEnglish
Title of host publicationStabilization, Safety, and Security of Distributed Systems - 9th International Symposium, SSS 2007, Proceedings
Pages253-265
Number of pages13
StatePublished - 1 Dec 2007
Event9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007 - Paris, France
Duration: 14 Nov 200716 Nov 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4838 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007
Country/TerritoryFrance
CityParis
Period14/11/0716/11/07

Keywords

  • Combinatorial optimization problems
  • Unidirectional encryption

Fingerprint

Dive into the research topics of 'Magnifying computing gaps establishing encrypted communication over unidirectional channels'. Together they form a unique fingerprint.

Cite this