A practical and secure communication protocol in the bounded storage model

  • Authors:
  • E. Savaş;Berk Sunar

  • Affiliations:
  • Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey;Electrical & Computer Engineering, Worcester Polytechnic Institute, Worcester, Massachusetts

  • Venue:
  • ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a unique private key encryption scheme called hyper-encryption which provides everlasting unconditional security. So far the work on the bounded storage model has been largely on the theoretical basis. In this paper, we make a first attempt to outline a secure communication protocol based on this model. We describe a protocol which defines means for successfully establishing and carrying out an encryption session and address potential problems such as protocol failures and attacks. Furthermore, we outline a novel method for authenticating and ensuring the integrity of a channel against errors.