[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2006/396

Security Protocols with Isotropic Channels

Madhukar Anand, Eric Cronin, Micah Sherr, Matt Blaze, and Sampath Kannan

Abstract

We investigate the security properties of "isotropic channels", broadcast media in which a receiver cannot reliably determine whether a message originated from any particular sender and a sender cannot reliably direct a message away from any particular receiver. We show that perfect isotropism implies perfect (information-theoretic) secrecy, and that asymptotically close to perfect secrecy can be achieved on any channel that provides some (bounded) uncertainty as to sender identity. We give isotropic security protocols under both passive and active adversary models, and discuss the practicality of realizing isotropic channels over various media.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
unconditional securitysecret-key agreementprovable securityisotropic channels
Contact author(s)
msherr @ cis upenn edu
History
2006-11-12: received
Short URL
https://ia.cr/2006/396
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/396,
      author = {Madhukar Anand and Eric Cronin and Micah Sherr and Matt Blaze and Sampath Kannan},
      title = {Security Protocols with Isotropic Channels},
      howpublished = {Cryptology {ePrint} Archive, Paper 2006/396},
      year = {2006},
      url = {https://eprint.iacr.org/2006/396}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.