Social key exchange network - from ad-hoc key exchange to a dense key network
نویسندگان
چکیده
Security of public key cryptography is steadily threatened by advancements in algorithmics and computing power. In this work we propose a novel approach to long-term secure key exchange based on security assumptions that are independent of strong complexity assumptions. We present a key propagation scheme that sets up a network of distributed keys. Whenever two parties meet, they exchange new keys (e.g. using near field communication) and pass on all keys received so far. This establishes a dense key network growing and spreading with each meeting of protocol participants. Even two parties that have never met in person can use this network to obtain a common secret. A notable security feature of our scheme is the anonymity of the established keys, making it hard for an adversary to track movements of protocol participants.
منابع مشابه
Social Key Exchange Network – From Ad-Hoc Key Exchanges to a Dense Key Network
Security of public key cryptography is steadily threatened by advancements in algorithmics and computing power. In this work we propose a novel approach to long-term secure key exchange based on security assumptions that are independent of strong complexity assumptions. We present a key propagation scheme that sets up a network of distributed keys. Whenever two parties meet, they exchange new k...
متن کاملNetwork Analysis of Interpersonal Relationships in Tehran Stock Exchange
The stock market has an important role in growth and development of countries. Network analysis is one of the latest method in analyzing the stock market. In quantitative science literature, It is a new concept for a macro view to whole market. Therefore, this research analyzes the interpersonal relationships’ network in the Tehran Stock Exchange (TSE). From the type of data collected and analy...
متن کاملThe Energy Cost of Secrets in Ad-hoc Networks (Short Paper)
Energy consumption of cryptographic algorithms and security protocols is a crucial factor in wireless ad-hoc networks. This work explores the energy cost of a key agreement process between two parties of an ad-hoc network using public-key encryption techniques and compares the results with regular networks which use secret-key based key-exchange protocols. Elliptic Curve public-key and Rijndael...
متن کاملPacket construction for secure conference call request in ad hoc network systems
In this paper, a packet construction mechanism using an ID-based factorial number structure (ID-based FNS) is proposed for a secure conference call system in an ad hoc network. We adopt the ID-based concept for a conference key generation in which each participant with one’s own public identity uses a pre-chosen secret-key to generate the exchange conference key for the conference call. Further...
متن کاملRouting Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, privacy, a secret key (or session key) is necessary to be shared between the sender and receiver. Because of the nature of MANET, it is unrealistic in many circumstances to implement Certification A...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011