Skip to main content

Addressing New Challenges by Building Security Protocols Around Graphs

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3364))

Abstract

We propose the use of graphs as basic objects in security protocols. While having all the functionality of their number based counterparts; such protocols can have extended capabilities, especially useful in the field of verification and analysis. The scalability and transitivity for graph related properties allow for addressing protocols of increasing complexity. These features also cater for new challenges in the future, for instance ones resulting from a quantum computing paradigm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shannon, C.E.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423 (1948)

    MATH  MathSciNet  Google Scholar 

  2. Goedel, K.: Uber formal unentscheidbare Satze der Principia Mathematica und verwander Systeme, I. Monatshefte fur Mathematik und Physik 38, 173–198 (1931)

    Article  MathSciNet  Google Scholar 

  3. Korte, B., Vygen, J.: Combinatorial Optimization, theory and algorithms. Springer, Heidelberg (2000)

    MATH  Google Scholar 

  4. Molloy, M., Reed, B.: Graph Colouring and the Probabilistic Method. Springer, Heilderberg (2002)

    MATH  Google Scholar 

  5. Beineke, L.W., Wilson, R.J. (eds.): Graph connections; relationships between graph theory and other areas of mathematics. Oxford University Press, New York (1997)

    MATH  Google Scholar 

  6. Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM 38(1), 691–729 (1991)

    MATH  MathSciNet  Google Scholar 

  7. Brassard, G., Chaum, D., Crepeau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Science 37(2), 156–189 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  8. Goldwasser, S.: The search for provably secure cryptosystems. In: Proceedings of Symposia in Applied Mathematics, Cryptology and Computational Number Theory, vol. 42, pp. 89–113. American Mathematical Society (1990)

    Google Scholar 

  9. Maurer, U.M.: Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 209–225. Springer, Heidelberg (1997)

    Google Scholar 

  10. Stinson, D.R.: Cryptography, Theory and Practice. CRC Press, Boca Raton (1995)

    MATH  Google Scholar 

  11. Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Heilderberg (2003)

    MATH  Google Scholar 

  12. Stinson, D.R., Wei, R.: Bibliography on Secret Sharing Schemes. Webpage, http://www.cacr.math.uwaterloo.ca/~dstinson/ssbib.html (retrieved 30.08.2003)

  13. Kulesza, K., Kotulski, Z., Pieprzyk, J.: On alternative approach for verifiable secret sharing. In: Zurich (ed.) ESORICS, Available from IACR’s Cryptology ePrint Archive (2002), (submitted for publication) http://eprint.iacr.org/ report 2003/035

  14. Kulesza, K., Kotulski, Z.: On graph coloring check-digit method. Submitted for publication, Available from the Los Alamos National Laborartory e-print (2002), http://arxiv.org/abs/math.CO/0211317

  15. Wilson, R.A.: Graphs, Colourings and the Four-colour Theorem. Oxford University Press, New York (2002)

    MATH  Google Scholar 

  16. Ryan, P.: Open questions. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 49–53. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Gruska, J.: Quantum Computing. McGraw Hill, New York (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kulesza, K., Kotulski, Z. (2005). Addressing New Challenges by Building Security Protocols Around Graphs. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2003. Lecture Notes in Computer Science, vol 3364. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11542322_36

Download citation

  • DOI: https://doi.org/10.1007/11542322_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28389-8

  • Online ISBN: 978-3-540-31836-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics