Abstract
This position paper proposes the use of special broadcast networks to achieve provable and measurable confidentiality of messages. We call these networks isotropic channels, broadcast channels in which receivers cannot reliably determine whether a given message originated from any particular sender and senders cannot prevent a message from reaching any particular receiver. As long as eavesdroppers cannot reliably (i.e., with probabilistic certainty) identify the sender of a message, honest parties can efficiently exchange messages with confidentiality that asymptotically approaches and in some cases reaches perfect secrecy. Even under incorrect assumptions regarding the degree of isotropism offered by a particular channel, a high measure of confidentiality can be efficiently achieved.
This position paper additionally makes the case that isotropic channels already exist, and are, in fact, often used in practice. By leveraging isotropic techniques, measurable information theoretic security can be practically achieved.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anand, M., Cronin, E., Sherr, M., Blaze, M., Kannan, S.: Security protocols with isotropic channels. Technical Report CIS-06-18, University of Pennsylvania, Department of Computer and Information Science (2006), http://micah.cis.upenn.edu/papers/isotropism-tr-cis-06-18.pdf
Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)
Castelluccia, C., Mutaf, P.: Shake them up!: A movement-based pairing protocol for CPU-constrained devices. In: MobiSys 2005: Proceedings of the 3rd International Conference on Mobile systems, Applications, and Services, pp. 51–64. ACM Press, New York (2005)
Scheuer, J., Yariv, A.: Giant fiber lasers: A new paradigm for secure key distribution. Physical Review Letters 97(14) (2006)
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65–75 (1988)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proc. of the 13th Usenix Security Symposium, pp. 303–320 (2004)
Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 16(4), 482–494 (1998)
Shields, C., Levine, B.N.: Hordes: a multicast based protocol for anonymity. Journal of Computer Security 10(3), 213–240 (2002)
Vernam, G.S.: Cipher printing telegraph systems for secret wire and radio telegraphic communications. Journal of the American Institute of Electrical Engineers 55, 109–115 (1926)
LAN/MAN Standards Committee: Wireless LAN medium access control (MAC) and physical layer (PHY). In: IEEE Standard 802. 11, IEEE Computer Society, Los Alamitos (1999)
LAN/MAN Standards Committee: Wireless LAN medium access control (MAC) and physical layer (PHY) amendment 6: Medium access control (MAC) security enhancements. In: IEEE Standard 802. 11i, IEEE Computer Society, Los Alamitos (2004)
Castelluccia, C., Avoine, G.: Noisy tags: A pretty good key exchange protocol for RFID tags. In: Seventh Smart Card Research and Advanced Application IFIP Conference (2006)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. In: ACM Transactions on Information and System Security (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sherr, M., Cronin, E., Blaze, M. (2010). Measurable Security through Isotropic Channels. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2007. Lecture Notes in Computer Science, vol 5964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17773-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-17773-6_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17772-9
Online ISBN: 978-3-642-17773-6
eBook Packages: Computer ScienceComputer Science (R0)