一种基于代数质量-时间优势的密钥建立协议

G. Amariucai, Sanchita Barman, Y. Guan
{"title":"一种基于代数质量-时间优势的密钥建立协议","authors":"G. Amariucai, Sanchita Barman, Y. Guan","doi":"10.1145/3212480.3212507","DOIUrl":null,"url":null,"abstract":"The essence of information assurance resides in the ability to establish secret keys between the legitimate communicating parties. Common approaches to key establishment include public-key infrastructure, key-distribution centers, physical-layer security or key extraction from common randomness. Of these, the latter two are based on specific natural advantages that the legitimate parties hold over their adversaries -- most often, such advantages rely on superior or privileged communication channels. This paper tackles a key-establishment protocol that relies on a completely different type of advantage: time. The protocol builds on the idea that when two devices are able to spend a pre-determined, mostly uninterrupted, interval of time in the company of each other, and when such a feat is outside the capability of any realistic attacker, then the legitimate parties should be able to establish a secret key without any prior common information. The paper presents a basic efficient time-based key establishment protocol, and demonstrates how it can be extended to follow customized information transfer functions and deal with predictable fluctuations of wireless interference.","PeriodicalId":267134,"journal":{"name":"Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol\",\"authors\":\"G. Amariucai, Sanchita Barman, Y. Guan\",\"doi\":\"10.1145/3212480.3212507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The essence of information assurance resides in the ability to establish secret keys between the legitimate communicating parties. Common approaches to key establishment include public-key infrastructure, key-distribution centers, physical-layer security or key extraction from common randomness. Of these, the latter two are based on specific natural advantages that the legitimate parties hold over their adversaries -- most often, such advantages rely on superior or privileged communication channels. This paper tackles a key-establishment protocol that relies on a completely different type of advantage: time. The protocol builds on the idea that when two devices are able to spend a pre-determined, mostly uninterrupted, interval of time in the company of each other, and when such a feat is outside the capability of any realistic attacker, then the legitimate parties should be able to establish a secret key without any prior common information. The paper presents a basic efficient time-based key establishment protocol, and demonstrates how it can be extended to follow customized information transfer functions and deal with predictable fluctuations of wireless interference.\",\"PeriodicalId\":267134,\"journal\":{\"name\":\"Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3212480.3212507\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3212480.3212507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

信息保障的本质在于在合法通信方之间建立密钥的能力。建立密钥的常用方法包括公钥基础设施、密钥分发中心、物理层安全性或从常见随机性中提取密钥。其中,后两者是基于合法各方对其对手所拥有的特定自然优势——通常,这种优势依赖于优越或特权的沟通渠道。本文讨论了一个依赖于完全不同类型优势的密钥建立协议:时间。该协议建立在这样一个理念之上:当两个设备能够在彼此的陪伴中度过一段预先确定的、几乎不间断的时间间隔,并且当这种行为超出任何现实攻击者的能力范围时,那么合法各方应该能够在没有任何事先公共信息的情况下建立一个密钥。本文提出了一种基于时间的基本高效密钥建立协议,并演示了如何将其扩展到遵循自定义的信息传递函数和处理可预测的无线干扰波动。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol
The essence of information assurance resides in the ability to establish secret keys between the legitimate communicating parties. Common approaches to key establishment include public-key infrastructure, key-distribution centers, physical-layer security or key extraction from common randomness. Of these, the latter two are based on specific natural advantages that the legitimate parties hold over their adversaries -- most often, such advantages rely on superior or privileged communication channels. This paper tackles a key-establishment protocol that relies on a completely different type of advantage: time. The protocol builds on the idea that when two devices are able to spend a pre-determined, mostly uninterrupted, interval of time in the company of each other, and when such a feat is outside the capability of any realistic attacker, then the legitimate parties should be able to establish a secret key without any prior common information. The paper presents a basic efficient time-based key establishment protocol, and demonstrates how it can be extended to follow customized information transfer functions and deal with predictable fluctuations of wireless interference.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信