Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Measurable Security through Isotropic Channels

  • Conference paper
Security Protocols (Security Protocols 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5964))

Included in the following conference series:

  • 472 Accesses

Abstract

This position paper proposes the use of special broadcast networks to achieve provable and measurable confidentiality of messages. We call these networks isotropic channels, broadcast channels in which receivers cannot reliably determine whether a given message originated from any particular sender and senders cannot prevent a message from reaching any particular receiver. As long as eavesdroppers cannot reliably (i.e., with probabilistic certainty) identify the sender of a message, honest parties can efficiently exchange messages with confidentiality that asymptotically approaches and in some cases reaches perfect secrecy. Even under incorrect assumptions regarding the degree of isotropism offered by a particular channel, a high measure of confidentiality can be efficiently achieved.

This position paper additionally makes the case that isotropic channels already exist, and are, in fact, often used in practice. By leveraging isotropic techniques, measurable information theoretic security can be practically achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anand, M., Cronin, E., Sherr, M., Blaze, M., Kannan, S.: Security protocols with isotropic channels. Technical Report CIS-06-18, University of Pennsylvania, Department of Computer and Information Science (2006), http://micah.cis.upenn.edu/papers/isotropism-tr-cis-06-18.pdf

  2. Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)

    Article  MathSciNet  MATH  Google Scholar 

  3. Castelluccia, C., Mutaf, P.: Shake them up!: A movement-based pairing protocol for CPU-constrained devices. In: MobiSys 2005: Proceedings of the 3rd International Conference on Mobile systems, Applications, and Services, pp. 51–64. ACM Press, New York (2005)

    Google Scholar 

  4. Scheuer, J., Yariv, A.: Giant fiber lasers: A new paradigm for secure key distribution. Physical Review Letters 97(14) (2006)

    Google Scholar 

  5. Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65–75 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  6. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proc. of the 13th Usenix Security Symposium, pp. 303–320 (2004)

    Google Scholar 

  7. Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 16(4), 482–494 (1998)

    Article  Google Scholar 

  8. Shields, C., Levine, B.N.: Hordes: a multicast based protocol for anonymity. Journal of Computer Security 10(3), 213–240 (2002)

    Article  Google Scholar 

  9. Vernam, G.S.: Cipher printing telegraph systems for secret wire and radio telegraphic communications. Journal of the American Institute of Electrical Engineers 55, 109–115 (1926)

    Google Scholar 

  10. LAN/MAN Standards Committee: Wireless LAN medium access control (MAC) and physical layer (PHY). In: IEEE Standard 802. 11, IEEE Computer Society, Los Alamitos (1999)

    Google Scholar 

  11. LAN/MAN Standards Committee: Wireless LAN medium access control (MAC) and physical layer (PHY) amendment 6: Medium access control (MAC) security enhancements. In: IEEE Standard 802. 11i, IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  12. Castelluccia, C., Avoine, G.: Noisy tags: A pretty good key exchange protocol for RFID tags. In: Seventh Smart Card Research and Advanced Application IFIP Conference (2006)

    Google Scholar 

  13. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. In: ACM Transactions on Information and System Security (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sherr, M., Cronin, E., Blaze, M. (2010). Measurable Security through Isotropic Channels. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2007. Lecture Notes in Computer Science, vol 5964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17773-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17773-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17772-9

  • Online ISBN: 978-3-642-17773-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics