Corpus ID: 2401515

Exchanging Secrets without Using Cryptography

@article{Siavoshani2011ExchangingSW,
  title={Exchanging Secrets without Using Cryptography},
  author={Mahdi Jafari Siavoshani and U. Pulleti and E. Atsan and I. Safaka and C. Fragouli and Katerina J. Argyraki and S. Diggavi},
  journal={ArXiv},
  year={2011},
  volume={abs/1105.4991}
}
  • Mahdi Jafari Siavoshani, U. Pulleti, +4 authors S. Diggavi
  • Published 2011
  • Computer Science, Mathematics
  • ArXiv
  • We consider the problem where a group of n nodes, connected to the same broadcast channel (e.g., a wireless network), want to generate a common secret bitstream, in the presence of an adversary Eve, who tries to obtain information on the bitstream. We assume that the nodes initially share a (small) piece of information, but do not have access to any out-of-band channel. We ask the question: can this problem be solved without relying on Eve's computational limitations, i.e., without using any… CONTINUE READING
    13 Citations
    Exchanging pairwise secrets efficiently
    • 13
    • PDF
    Creating shared secrets out of thin air
    • 16
    • PDF
    Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels
    • 4
    • PDF
    Secret Communication Over Broadcast Erasure Channels With State-Feedback
    • 15
    • PDF
    Group secret key agreement over state-dependent wireless broadcast channels
    • 11
    • PDF
    Secure Capacity Region for Erasure Broadcast Channels with Feedback
    • 2
    • PDF
    Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication
    • Highly Influenced
    • PDF
    They can hear your heartbeats
    • 86
    Shield yourself from pattern detection
    • Lan Yao, Fuxiang Gao, G. Yu
    • Engineering
    • 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems
    • 2013
    Pattern Regulator: Protecting Temporal Usage Privacy for Wireless Body Area Sensor Networks
    • Lan Yao, Xiangyang Li, G. Yu
    • Computer Science
    • 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops
    • 2013
    • 1

    References

    SHOWING 1-10 OF 40 REFERENCES
    Information-Theoretic Key Agreement of Multiple Terminals—Part II: Channel Model
    • 78
    • PDF
    Information-theoretic key agreement of multiple terminal: part II: channel model
    • 26
    Secret key agreement by public discussion from common information
    • U. Maurer
    • Mathematics, Computer Science
    • IEEE Trans. Inf. Theory
    • 1993
    • 458
    • PDF
    Key Agreement from Close Secrets over Unsecured Channels
    • 88
    • PDF
    Dialog codes for secure wireless communications
    • A. Arora, L. Sang
    • Computer Science
    • 2009 International Conference on Information Processing in Sensor Networks
    • 2009
    • 22
    • PDF
    Experimental Quantum Cryptography
    • 1,189
    • PDF
    Secure Wireless Communication with Dynamic Secrets
    • 67
    • PDF
    Keys Through ARQ: Theory and Practice
    • 46
    • PDF
    On noise insertion strategies for wireless network secrecy
    • 20