Trust enhancement by multiple random beacons
نویسندگان
چکیده
Random beacons—information sources that broadcast a stream of random digits unknown by anyone beforehand—are useful for various cryptographic purposes. But such beacons can be easily and undetectably sabotaged, so that their output is known beforehand by a dishonest party, who can use this information to defeat the cryptographic protocols supposedly protected by the beacon. We explore a strategy to reduce this hazard by combining the outputs from several noninteracting (eg spacelike-separated) beacons by XORing them together to produce a single digit stream which is more trustworthy than any individual beacon, being random and unpredictable if at least one of the contributing beacons is honest. If the contributing beacons are not spacelike separated, so that a dishonest beacon can overhear and adapt to earlier outputs of other beacons, the beacons’ trustworthiness can still be enhanced to a lesser extent by a time sharing strategy. We point out some disadvantages of alternative trust amplification methods based on one-way hash functions. A. Introduction
منابع مشابه
Explaining the Relationship of Social trust on the Citizenship Ethics of, High School Students in Bushehr City
the aim of this study is explaining the relationship between social trust with citizenship ethic. The study population consisted of all high school students in Bushehr city that among this population, a sample of 360 students were selected by multistage random sampling method. the research tools included multi dimension comparison of recognized social support, questionnaire of social trust and ...
متن کاملGenotyping Single Nucleotide Polymorphisms Using Different Molecular Beacon Multiplexed within a Suspended Core Optical Fiber
We report a novel approach to genotyping single nucleotide polymorphisms (SNPs) using molecular beacons in conjunction with a suspended core optical fiber (SCF). Target DNA sequences corresponding to the wild- or mutant-type have been accurately recognized by immobilizing two different molecular beacons on the core of a SCF. The two molecular beacons differ by one base in the loop-probe and uti...
متن کاملBeacons for Authentication in Distributed Systems
Reliable authentication of communicating entities is essential for achieving security in a distributed computing environment. The design of such systems as Kerberos, SPX and more recently KryptoKnight and Kuperee, have largely been successful in addressing the problem. The common element with these implementations is the need for a trusted third-party authentication service. This essentially re...
متن کاملBandwidth and Delay Optimization by Integrating of Software Trust Estimator with Multi-User Cloud Resource Competence
Trust Establishment is one of the significant resources to enhance the scalability and reliability of resources in the cloud environment. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is...
متن کاملTrope: Trust Based Secure Robust Position Estimation in Wireless Sensor Networks
Secure localization is a critical issue in wireless sensor networks. Providing a certain degree of localization accuracy at the presence of malicious beacons becomes a challenging task. Robust Position Estimation (ROPE) is one of the secure localization systems. However, this system suffers from compromised network entities. Trust Based Secure Robust Position Estimation filters the compromised ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره cs.CR/0201003 شماره
صفحات -
تاریخ انتشار 2002