Second Summary Report on Unconditionally Secure Protocols
نویسندگان
چکیده
This report focuses on unconditionally secure cryptographic protocols. Such protocols are based on a limitation of the adversary’s knowledge in an information-theoretic or quantumtheoretic sense. They provide a very strong form of security because they cannot even be attacked by an adversary with unlimited computational resources, in contrast to the notion of computational security used otherwise. We consider three different models that provide unconditional security (noisy-channel cryptography, bounded-storage cryptography, and quantum cryptography), and for each of them we present the current state-of-the-art and stress the most important open problems.
منابع مشابه
Second Summary Report on Multiparty Protocols Second Summary Report on Multiparty Protocols
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...
متن کاملua nt - p h / 00 06 10 9 v 7 18 O ct 2 00 0 UNCONDITIONALLY SECURE QUANTUM BIT COMMITMENT IS POSSIBLE Horace
Bit commitment involves the submission of evidence from one party to another so that the evidence can be used to confirm a later revealed bit value by the first party, while the second party cannot determine the bit value from the evidence alone. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a ge...
متن کاملPractical unconditionally secure two-channel message authentication
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication protocols (NIMAPs) and interactive message authentication protocols (IMAPs). We provide a new proof of nonexistence of nontrivial unconditionally secure NIMAPs. This proof consists of a combinatorial counting argument ...
متن کاملUnconditionally Reliable and Secure Message Transmission in Directed Networks Revisited
In this paper, we re-visit the problem of unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbounded computing power. Desmedt et.al [5] have given the necessary and sufficient condition for the existence of URMT and USMT protocols in directed ne...
متن کاملSecond Summary Report on Two-party Protocols Second Summary Report on Two-party Protocols
This report focuses on secure two-party protocols. We consider different notions of security and discuss the most attractive models and set-up assumptions (e.g., random oracle, common reference string, bare public keys, trusted computing base) that have been proposed so far. We consider many popular two-party games (e.g., zero-knowledge proof systems, commitment schemes, oblivious transfer, fai...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006