Cryptographic protocols with everyday objects
Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. pp. 1-26.
|
Text
non-crypto-protocols.pdf - Accepted version Manuscript Download (600kB) | Preview |
Abstract
Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes. © 2013 British Computer Society.
Item Type: | Article | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Divisions : | Faculty of Engineering and Physical Sciences > Computing Science | ||||||||||||
Authors : |
|
||||||||||||
Date : | 2013 | ||||||||||||
DOI : | 10.1007/s00165-013-0274-7 | ||||||||||||
Additional Information : | The original publication is available at http://www.springerlink.com | ||||||||||||
Depositing User : | Symplectic Elements | ||||||||||||
Date Deposited : | 29 Nov 2013 10:32 | ||||||||||||
Last Modified : | 09 Jun 2014 13:47 | ||||||||||||
URI: | http://epubs.surrey.ac.uk/id/eprint/804612 |
Actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year