Unconditionally Secure Key Distribution Against Active Adversaries

ثبت نشده
چکیده

In this report we will give an overview of current results and protocols for unconditional secure keyagreement based on access to shared randomness, see [2, 3, 4], and determine how useful these are in practice, and finally from this propose new open problems that could be looked at in the future. We assume that the reader is familiarly with the concepts of entropy and the passive key-generation algorithm as described in [6]. The key-agreement problem is fundamental to cryptography, it is the problem of generating a secret key between the parties Alice and Bob, which initially does not share a key, while the adversary Eve has access to the communications channel between Alice and Bob. We can now make different assumptions on Eve, in public-key cryptography as proposed by Diffie and Hellman, we assume 1) Eve have limited computational resources, say she is unable to solve the factoring or discrete log problem in feasible time. Furthermore 2) Eve is a passive adversaries, that is she can only read what is sent through the communications channel between Alice and Bob, this way the communication between Alice and Bob is authenticated. In [2, 3, 4] these two assumptions are dropped, so Eve has infinite computing power and has complete control over the communications channel used by Alice and Bob, so we want unconditional secure key-agreement protocols by use of an insecure an unauthenticated channel. Unconditional security has not been widely used in practice due to Shannons discouraging result, see [5], which basically says that we need a key at least as long as the message we want to send, to achieve unconditional security, and we need a new key for each message we want to send. But it turns out, as we will see in this report, that if the parties wanting to communicate have access to correlated random bits that has a property called non-simulatability, then they can agree on a secret key by use of a insecure and unauthentic channel which an adversary has complete control over, provided, of course, that the adversary does not block all communications through the channel. Then they can use this key as a one-time pad and achieve a communications channel with unconditional security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A method of Authentication for Quantum Networks

Quantum cryptography offers a way of key agreement, which is unbreakable by an eavesdropping adversary. Authentication is of crucial importance, as perfect secrecy is worthless if the identity of the addressee cannot be ensured before sending important information. Message authentication has been studied thoroughly, but no approach seems to be able to explicitly counter meet-in-the-middle imper...

متن کامل

Mitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

متن کامل

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure

A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure against active and mobile adversary. We consider a general access structure for the set of servers an...

متن کامل

Information-theoretically Secure Secret-key Agreement by Not Authenticated Public Discussion 1

All information-theoretically secure key agreement protocols (e.g. based on quantum cryptography or on noisy channels) described in the literature are secure only against passive adversaries in the sense that they assume the existence of an authenticated public channel. The goal of this paper is to investigate information-theoretic security even against active adversaries with complete control ...

متن کامل

Insecurity of position-based quantum cryptography protocols against entanglement attacks

Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009