Secrecy Group Creation with Symmetric-Key Cryptography
نویسنده
چکیده
We lift Cardelli, Ghelli and Gordon’s secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extension of the associated type system. We then formulate a notion of secrecy preservation in the presence of cryptography, and prove that well-typed processes in the extended type system preserve secrecy of declared secrets, even in the presence of untyped opponents.
منابع مشابه
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon’s notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using...
متن کاملSecrecy from Resolvability
We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the notion of resolvability. Instead of considering capacity-based constructions, which associate to each message a sub-code that operates just below the capacity of the eavesdropper’s channel, we consider resolvability-based constructions, which associate to each message...
متن کاملProviding perfect forward secrecy for location-aware wireless sensor networks
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks....
متن کاملKey Establishment Protocol for Computation-limited Devices
This paper present a new protocol based on symmetric encryption, which has quasi-forward secrecy and resistance to quasi-key compromise impersonation. It is a protocol suitable for computation-limited devices. Also by blinding the long-term key, we make the attack to long-term key harder.We have done the theoretical analysis and will finish the simulation and implementation.
متن کاملCapacity Achieving Codes for the Wire Tap Channel with Applications to Quantum Key Distribution
With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical error-correcting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspecti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005