V. Yakovlev, V. Korzhik, V. Starostin, Alexey Lapshin, A. Zhuvikin
{"title":"Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions","authors":"V. Yakovlev, V. Korzhik, V. Starostin, Alexey Lapshin, A. Zhuvikin","doi":"10.23919/FRUCT56874.2022.9953895","DOIUrl":null,"url":null,"abstract":"A further development of the key sharing protocol presented at previous FRUCT -31 session is proposed in the current paper. In contrast to the previous protocol executing by an exchange of real integers over Internet channel, a new protocol version operates with binary bits and all operations are modulo two additions. Such version significantly decreases channel traffic required for key sharing and a complexity of signal processing. The full description of protocol is given. Optimality of signal processing proposed in the paper for eavesdropper is proved.","PeriodicalId":274664,"journal":{"name":"2022 32nd Conference of Open Innovations Association (FRUCT)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT56874.2022.9953895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A further development of the key sharing protocol presented at previous FRUCT -31 session is proposed in the current paper. In contrast to the previous protocol executing by an exchange of real integers over Internet channel, a new protocol version operates with binary bits and all operations are modulo two additions. Such version significantly decreases channel traffic required for key sharing and a complexity of signal processing. The full description of protocol is given. Optimality of signal processing proposed in the paper for eavesdropper is proved.