Strengthening key agreement using hard-core sets
نویسنده
چکیده
Given an authentic communication channel, a key agreement protocol enables two parties to obtain a common bit string (the key), such that an eavesdropper does not have any information about it, even if he observes the whole communication. While no such protocol is secure in an information theoretic sense, it seems possible to give a key agreement protocol which is secure against eavesdroppers which do not have exceedingly large computational power. In fact, many protocols which promise to achieve such computational security are used in practice today. This holds even though no such protocol has been proven secure. Instead, the security of such a protocol is based on an unproven, but plausible assumption. The goal of this thesis is to construct a computationally secure key agreement protocol whose security is based on an assumption which is as weak as possible. The assumption we use is the existence of a “weak key agreement protocol”. Such a protocol works partially: in some executions the honest parties get the same key, but sometimes their respective keys differ. Furthermore, in some cases the resulting key is secret, while sometimes information about the key is leaked to an eavesdropper. We then strengthen such a protocol; i.e., we make it both secret and correct. In order to simplify the study, we restrict the given weak key agreement protocol to yield a single key bit. To strengthen a weak key agreement protocol, we proceed in two steps. In a first step, we solve a related, completely information theoretic problem. More concretely we assume that some trusted source distributes random variables to the honest parties and to an eavesdropper according to a fixed and commonly known distribution. We then study whether the honest parties can use this randomness in order to obtain an information theoretically secure key. Such information theoretic key agreement from correlated information is a problem which has been studied before. It is interesting in its own right, and we look at it in some depth. In a second step we show that certain protocols for the information theoretic setting we described can be used in the computational setting as well. Thus, we first use the weak key agreement protocol to obtain
منابع مشابه
Comparing the Electromyography Activity of Core Muscles During Side Plank Exercise on Stable and Unstable Surfaces
Objective Numerous abdominal exercises with Swiss ball are used to improve core stability with strengthening and rehabilitation goals. It is claimed that the stability exercises have a greater impact on core muscle activation, but the validity of this claim is still in doubt. Moreover, there is no comprehensive study on the comparison of the core muscles activity in different core stability exe...
متن کاملBasing Weak Public-Key Cryptography on Strong One-Way Functions
In one of the pioneering papers on public-key cryptography, Ralph Merkle suggested a heuristic protocol for exchanging a secret key over an insecure channel by using an idealized private-key encryption scheme. Merkle’s protocol is presumed to remain secure as long as the gap between the running time of the adversary and that of the honest parties is at most quadratic (rather than super-polynomi...
متن کاملA Hard Convex Core Yukawa Equation of State for Nonassociated Chain Molecules
The compressibility factor of nonassociated chain molecules composed of hard convex core Yukawa segments was derived with SAFT-VR and an extension of the Barker-Henderson perturbation theory for convex bodies. The temperature-dependent chain and dispersion compressibility factors were derived using the Yukawa potential. The effects of temperature, packing fraction, and segment number on the com...
متن کاملManagement Matters: A Leverage Point for Health Systems Strengthening in Global Health
Despite a renewed focus in the field of global health on strengthening health systems, inadequate attention has been directed to a key ingredient of high-performing health systems: management. We aimed to develop the argument that management – defined here as the process of achieving predetermined objectives through human, financial, and technical resources – is a cross-cutting function necessa...
متن کاملICF core sets for low back pain: do they include what matters to patients?
OBJECTIVE To investigate whether the International Classification of Functioning Disability and Health (ICF) Core Sets for low back pain encompass the key functional problems of patients. DESIGN Cross-sectional evaluation of patient-centred problems with low back pain. SUBJECTS A total of 402 patients living in the UK recruited into a randomized clinical trial. METHODS Patients with acute...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006