Trust enhancement by multiple random beacons

نویسندگان

  • Charles H. Bennett
  • John A. Smolin
چکیده

Random beacons—information sources that broadcast a stream of random digits unknown by anyone beforehand—are useful for various cryptographic purposes. But such beacons can be easily and undetectably sabotaged, so that their output is known beforehand by a dishonest party, who can use this information to defeat the cryptographic protocols supposedly protected by the beacon. We explore a strategy to reduce this hazard by combining the outputs from several noninteracting (eg spacelike-separated) beacons by XORing them together to produce a single digit stream which is more trustworthy than any individual beacon, being random and unpredictable if at least one of the contributing beacons is honest. If the contributing beacons are not spacelike separated, so that a dishonest beacon can overhear and adapt to earlier outputs of other beacons, the beacons’ trustworthiness can still be enhanced to a lesser extent by a time sharing strategy. We point out some disadvantages of alternative trust amplification methods based on one-way hash functions. A. Introduction

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Explaining the Relationship of Social trust on the Citizenship Ethics of, High School Students in Bushehr City

the aim of this study is explaining the relationship between social trust with citizenship ethic. The study population consisted of all high school students in Bushehr city that among this population, a sample of 360 students were selected by multistage random sampling method. the research tools included multi dimension comparison of recognized social support, questionnaire of social trust and ...

متن کامل

Genotyping Single Nucleotide Polymorphisms Using Different Molecular Beacon Multiplexed within a Suspended Core Optical Fiber

We report a novel approach to genotyping single nucleotide polymorphisms (SNPs) using molecular beacons in conjunction with a suspended core optical fiber (SCF). Target DNA sequences corresponding to the wild- or mutant-type have been accurately recognized by immobilizing two different molecular beacons on the core of a SCF. The two molecular beacons differ by one base in the loop-probe and uti...

متن کامل

Beacons for Authentication in Distributed Systems

Reliable authentication of communicating entities is essential for achieving security in a distributed computing environment. The design of such systems as Kerberos, SPX and more recently KryptoKnight and Kuperee, have largely been successful in addressing the problem. The common element with these implementations is the need for a trusted third-party authentication service. This essentially re...

متن کامل

Bandwidth and Delay Optimization by Integrating of Software Trust Estimator with Multi-User Cloud Resource Competence

Trust Establishment is one of the significant resources to enhance the scalability and reliability of resources in the cloud environment. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is...

متن کامل

Trope: Trust Based Secure Robust Position Estimation in Wireless Sensor Networks

Secure localization is a critical issue in wireless sensor networks. Providing a certain degree of localization accuracy at the presence of malicious beacons becomes a challenging task. Robust Position Estimation (ROPE) is one of the secure localization systems. However, this system suffers from compromised network entities. Trust Based Secure Robust Position Estimation filters the compromised ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره cs.CR/0201003  شماره 

صفحات  -

تاریخ انتشار 2002