Key Agreement via Protocols
Inspired by the ideas of no cloning and measurable degrading that quantum key agreement protocols rely on, we devise novel key agreement protocols for the classical world. Our protocols are based on identical devices that are mass produced and distributed among parties participating in the protocol. We thus use protocols a little outside their normal range and seemingly achieve the impossible by relying on certain assumptions on the devices.
- 4.Colombier, B., Bossuet, L.: A survey of hardware protection of design data for integrated circuits and intellectual properties. IET Comput. Digit. Tech. Inst. Eng. Technol. 8(6), 274287 (2014)Google Scholar
- 11.Roscoe, A.W.: Modelling and verifying key-exchange protocols using CSP and FDR. In: Proceedings of the Eighth IEEE Computer Security Foundations Workshop. IEEE (1995)Google Scholar
- 13.Roscoe, A.W., Wang, L., Chen, B.: New approaches to key agreement and public key cryptography. In: preparationGoogle Scholar
- 14.Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, A.W.: The Modelling and Analysis of Security Protocols: The CSP Approach. Addison-Wesley Professional, Boston (2001)Google Scholar