Cryptographic communication using shared experiences

نویسنده

  • Joseph Bonneau
چکیده

We propose a protocol for confidential one-way communication between two parties who know each other well using only preexisting knowledge from their shared life experience. This could enable, for example, lovers or close friends to communicate without prior key exchange. Our system uses a flexible secret-sharing mechanism to accommodate personal knowledge of variable guessing resistance and memorability with reasonable overhead in terms of computation and storage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Mutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication

It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that ...

متن کامل

'My Life, Shared' - Trust and Privacy in the Age of Ubiquitous Experience Sharing (Dagstuhl Seminar 13312)

Many researchers have already begun using personal mobile devices as personal “sensing instruments” and designed tools that reposition individuals as producers, consumers, and remixers of a vast openly shared public data set. By empowering people to easily measure, report, and compare their own personal environment, such tools transform everyday citizens into “reporting agents” who uncover and ...

متن کامل

Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links

Most wireless communication techniques rely on broadcast media on the physical layer, i.e., the actual signal can be received by any party in a certain coverage area. Furthermore, there are cable-based networks, such as HFC (hybrid fiber/coaxial) networks that use a shared transmission medium (coaxial cable) to bridge the last mile. A common means to perform secure unicast (point-to-point) comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012