Human perfectly secure message transmission protocols and their applications

3Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Perfectly secure message transmission (PSMT) schemes have been studied in the field of cryptography for nearly 20 years. In this paper we introduce a new aspect to PSMT. We consider the case when the hardware/software used by the receiver might be corrupted by the adversary. To address this, we replace the receiver by a human (the dual of this is when the sender is a human). Because of this, any proposed protocols should be computationally efficient for a human to carry out. Additionally, they should be as simple as possible, requiring minimal amount of thought and effort for someone to use them correctly. Taking the above into consideration, we propose two different constructions of such protocols. These have been designed to be secure and to be usable - so as to be easy and accurate when human parties use them. Experiments were carried out with human participants to evaluate what humans can compute. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Erotokritou, S., & Desmedt, Y. (2012). Human perfectly secure message transmission protocols and their applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7485 LNCS, pp. 540–558). https://doi.org/10.1007/978-3-642-32928-9_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free