Transporting a Secret using Destructively-Read Memory
Christianson, Bruce and Shafarenko, Alex
(2023)
Transporting a Secret using Destructively-Read Memory.
In:
Security Protocols XXVIII :.
Lecture Notes in Computer Science, 14186
.
Springer Nature.
ISBN 978-3-031-43032-9
Alice wants to send Bob a secret such as a one-time pad. Our proposal is to use a specially designed mass-produced memory chip, rather like a flash drive, called a DeRM (Destructive-Read Memory). As with other distribution methods, including tamper-evident containers and QKD, we require a side-channel that provides end-point authentication and message integrity (although not message secrecy). Advantages of the DeRM over other tamper-evident containers include that DeRMs can be clonable, and correct verification that the DeRM has not been accessed in transit is ensured by the process of extracting the secret content.
Item Type | Book Section |
---|---|
Additional information | © 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1007/978-3-031-43033-6_3 |
Date Deposited | 15 May 2025 16:49 |
Last Modified | 30 May 2025 23:19 |
Explore Further
-
picture_as_pdf - DeRM_2.pdf
-
subject - Submitted Version
-
copyright - Available under Unspecified
Share this file
Downloads