Transporting a Secret using Destructively-Read Memory

Bruce Christianson, Alex Shafarenko

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Downloads (Pure)

Abstract

Alice wants to send Bob a secret such as a one-time pad. Our proposal is to use a specially designed mass-produced memory chip, rather like a flash drive, called a DeRM (Destructive-Read Memory). As with other distribution methods, including tamper-evident containers and QKD, we require a side-channel that provides end-point authentication and message integrity (although not message secrecy). Advantages of the DeRM over other tamper-evident containers include that DeRMs can be clonable, and correct verification that the DeRM has not been accessed in transit is ensured by the process of extracting the secret content.
Original languageEnglish
Title of host publicationSecurity Protocols XXVIII
PublisherSpringer Nature Link
Volume14186
ISBN (Electronic)978-3-031-43033-6
ISBN (Print)978-3-031-43032-9
DOIs
Publication statusPublished - 21 Oct 2023

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Fingerprint

Dive into the research topics of 'Transporting a Secret using Destructively-Read Memory'. Together they form a unique fingerprint.

Cite this