UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Unconditionally private and reliable communication in an untrusted network

Desmedt, Y; (2005) Unconditionally private and reliable communication in an untrusted network. In: 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security. (pp. 38 - 41). IEEE

Full text not available from this repository.

Abstract

Most successful attacks that occur today against computer networks are targeted against the computers connected to the network, but not against the routers. At the BlackHat 2005 conference it was shown that potential attacks against routers are far from hypothetical. Current TCP/IP protocols (even including IPSEC) do not have the resilience to deal with routers taken over by the adversary.We survey the research done in the area of how to communicate reliably and/or privately in the presence of different types of adversary, for example a malicious (Byzantine) one. Evidently, if the adversary can control all nodes (routers) in the network, no solution exists. The nodes that can be attacked by the adversary can be described using a threshold, or by what is called an adversary structure. The type of networks studied are point-to-point or broadcast/multicast.

Type: Proceedings paper
Title: Unconditionally private and reliable communication in an untrusted network
Event: IEEE Information Theory Workshop
Location: Awaji Isl, JAPAN
Dates: 2005-10-16 - 2005-10-19
ISBN: 0-7803-9491-7
Keywords: SECURE MESSAGE TRANSMISSION, WRIGHTS QUESTION, FRANKLIN, CHANNELS, ANSWER
URI: http://discovery.ucl.ac.uk/id/eprint/139150
Downloads since deposit
0Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item