University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Cryptographic protocols with everyday objects

Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. pp. 1-26.

[img]
Preview
Text
non-crypto-protocols.pdf - Accepted version Manuscript

Download (600kB) | Preview

Abstract

Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes. © 2013 British Computer Society.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
AuthorsEmailORCID
Heather, JUNSPECIFIEDUNSPECIFIED
Schneider, SUNSPECIFIEDUNSPECIFIED
Teague, VUNSPECIFIEDUNSPECIFIED
Date : 2013
Identification Number : 10.1007/s00165-013-0274-7
Additional Information : The original publication is available at http://www.springerlink.com
Depositing User : Symplectic Elements
Date Deposited : 29 Nov 2013 10:32
Last Modified : 09 Jun 2014 13:47
URI: http://epubs.surrey.ac.uk/id/eprint/804612

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800