Skip to main content
Top

2019 | OriginalPaper | Chapter

Key Agreement via Protocols

Authors : Andrew William Roscoe, Lei Wang

Published in: Foundations of Security, Protocols, and Equational Reasoning

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Inspired by the ideas of no cloning and measurable degrading that quantum key agreement protocols rely on, we devise novel key agreement protocols for the classical world. Our protocols are based on identical devices that are mass produced and distributed among parties participating in the protocol. We thus use protocols a little outside their normal range and seemingly achieve the impossible by relying on certain assumptions on the devices.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Cerf, N.J., Levy, M., Van Assche, G.: Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A 63(5), 052311 (2001)CrossRef Cerf, N.J., Levy, M., Van Assche, G.: Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A 63(5), 052311 (2001)CrossRef
4.
go back to reference Colombier, B., Bossuet, L.: A survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput. Digit. Tech. Inst. Eng. Technol. 8(6), 274287 (2014) Colombier, B., Bossuet, L.: A survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput. Digit. Tech. Inst. Eng. Technol. 8(6), 274287 (2014)
7.
go back to reference Lowe, G.: Casper: a compiler for the analysis of security protocols. J. Comput. Secur. 6(1–2), 53–84 (1998)CrossRef Lowe, G.: Casper: a compiler for the analysis of security protocols. J. Comput. Secur. 6(1–2), 53–84 (1998)CrossRef
8.
go back to reference Meadows, C.: The NRL protocol analyzer: an overview. J. Log. Program. 26(2), 113–131 (1996)CrossRef Meadows, C.: The NRL protocol analyzer: an overview. J. Log. Program. 26(2), 113–131 (1996)CrossRef
10.
go back to reference Meadows, C.: Applying formal methods to the analysis of a key management protocol. J. Comput. Secur. 1(1), 5–35 (1992)CrossRef Meadows, C.: Applying formal methods to the analysis of a key management protocol. J. Comput. Secur. 1(1), 5–35 (1992)CrossRef
11.
go back to reference Roscoe, A.W.: Modelling and verifying key-exchange protocols using CSP and FDR. In: Proceedings of the Eighth IEEE Computer Security Foundations Workshop. IEEE (1995) Roscoe, A.W.: Modelling and verifying key-exchange protocols using CSP and FDR. In: Proceedings of the Eighth IEEE Computer Security Foundations Workshop. IEEE (1995)
12.
go back to reference Roscoe, A.W., Broadfoot, P.J.: Proving security protocols with model checkers by data independence techniques. J. Comput. Secur. 7(2–3), 147–190 (1999)CrossRef Roscoe, A.W., Broadfoot, P.J.: Proving security protocols with model checkers by data independence techniques. J. Comput. Secur. 7(2–3), 147–190 (1999)CrossRef
13.
go back to reference Roscoe, A.W., Wang, L., Chen, B.: New approaches to key agreement and public key cryptography. In: preparation Roscoe, A.W., Wang, L., Chen, B.: New approaches to key agreement and public key cryptography. In: preparation
14.
go back to reference Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, A.W.: The Modelling and Analysis of Security Protocols: The CSP Approach. Addison-Wesley Professional, Boston (2001) Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, A.W.: The Modelling and Analysis of Security Protocols: The CSP Approach. Addison-Wesley Professional, Boston (2001)
Metadata
Title
Key Agreement via Protocols
Authors
Andrew William Roscoe
Lei Wang
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-19052-1_11

Premium Partner