@inproceedings{5315f26e65ac4e1887902c371937e987,
title = "Transporting a Secret using Destructively-Read Memory",
abstract = "Alice wants to send Bob a secret such as a one-time pad. Our proposal is to use a specially designed mass-produced memory chip, rather like a flash drive, called a DeRM (Destructive-Read Memory). As with other distribution methods, including tamper-evident containers and QKD, we require a side-channel that provides end-point authentication and message integrity (although not message secrecy). Advantages of the DeRM over other tamper-evident containers include that DeRMs can be clonable, and correct verification that the DeRM has not been accessed in transit is ensured by the process of extracting the secret content.",
author = "Bruce Christianson and Alex Shafarenko",
note = "{\textcopyright} 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1007/978-3-031-43033-6_3",
year = "2023",
month = oct,
day = "21",
doi = "10.1007/978-3-031-43033-6_3",
language = "English",
isbn = "978-3-031-43032-9",
volume = "14186",
series = "Lecture Notes in Computer Science",
publisher = "Springer Nature Link",
booktitle = "Security Protocols XXVIII",
address = "Netherlands",
}