skip to main content
research-article
Open Access

Cryptographic protocols with everyday objects

Authors Info & Claims
Published:01 January 2014Publication History
Skip Abstract Section

Abstract

Abstract

Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes.

References

  1. Cha88 Chaum DThe dining cryptographers problem: unconditional sender and recipient untraceabilityJ Cryptol198811657510.1007/BF002063260654.94012935902Google ScholarGoogle ScholarCross RefCross Ref
  2. ElG85 ElGamal TA public-key cryptosystem and a signature scheme based on discrete logarithmsIEEE Trans Inf Theory19853146947210.1109/TIT.1985.10570740571.94014798552Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. For97 Formal Systems (Europe) Ltd (1997) Failures-divergence refinement—FDR 2 user manual. Formal Systems’ web site. http://www.formal.demon.co.uk/FDR2.htmlGoogle ScholarGoogle Scholar
  4. GW05 Goldsmith M, Whittaker P (2005) A CSP frontend for probabilistic tools. Technical report, The FORWARD project, June 2005. http://forward-project.org.uk/PDF_Files/D14.pdf. Accessed 14 Aug 2012Google ScholarGoogle Scholar
  5. KLN+06 Kacprzak MLomuscio ANiewiadomski APenczek WRaimondi FSzreter MComparing BDD and SAT based techniques for model checking Chaum’s dining cryptographers protocolFundam Inf2006721–32152341097.680742265163Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. MMSS96 Morgan CMciver ASeidel KSanders JWRefinement-oriented probability for CSPForm Asp Comp19968661764710.1007/BF012134920862.68050Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. MRR10 Mauw S, Radomirović S, Ryan PY (2010) Security protocols for Secret Santa. In: Proceedings of 18th Security Protocols workshop, 24–26 March 2010. Lecture notes in computer science. SpringerGoogle ScholarGoogle Scholar
  8. RGG+95 Roscoe AW, Gardiner PHB, Goldsmith M, Hulance JR, Jackson DM, Scattergood JB (1995) Hierarchical compression for model-checking CSP or how to check 1020 dining philosophers for deadlock. In: Brinksma Ed, Cleaveland R, Guldstrand Larsen K, Margaria T, Steffen B (eds) TACAS. Lecture notes in computer science, vol 1019. Springer, Berlin, pp 133–152Google ScholarGoogle Scholar
  9. Ros10 Roscoe AWUnderstanding concurrent systems20101New YorkSpringer10.1007/978-1-84882-258-01211.68205Google ScholarGoogle ScholarCross RefCross Ref
  10. Sch99a Schneider SA (1999) Concurrent and real-time systems: the CSP approach. WileyGoogle ScholarGoogle Scholar
  11. Sch99b Schneier B (1999) The solitaire encryption algorithm. http://www.schneier.com/solitaire.html. Accessed 22 March 2011Google ScholarGoogle Scholar
  12. Sin11 Singh S (2011) Personal communication, March 2011Google ScholarGoogle Scholar
  13. SS96 Schneider S, Sidiropoulos A (1996) CSP and anonymity. In: Bertino E, Kurth H, Martella G, Montolivo E (eds) European symposium on Research Into Computer Security (ESORICS) 96. Lecture notes in computer science, vol 1146, pp 198–218. Springer, Berlin-HeidelbergGoogle ScholarGoogle Scholar
  14. Ste00 Stephenson N (2000) Cryptonomicon. Arrow BooksGoogle ScholarGoogle Scholar
  15. vdMS04 van der Meyden R, Su K (2004) Symbolic model checking the knowledge of the dining cryptographers. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW), June 2004Google ScholarGoogle Scholar

Index Terms

  1. Cryptographic protocols with everyday objects
                  Index terms have been assigned to the content through auto-classification.

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader