Alice and Bob in love (transcript of discussion)

Joseph Bonneau

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

I'm Joseph Bonneau for those of you who don't know me. I'll talk about this natural entropy concept that I want to use to do encryption, I'll propose a pretty short and simple crypto protocol. I actually did this experimentally since writing the pre-proceedings paper, so I'll talk about how that went, it was kind of interesting. Hopefully I'll have a lot of time left over for discussion, because there's a lot here that is pretty hard. I guess cryptographers are in the habit of saying that human memory is bad. It's actually really good for a lot of things, it's just not good for things that are very high entropy, like crypto keys, but my theory is that people remember things that have actually happened and experiences of other people quite well. So my guiding idea here is that there's all these people in the world who you actually share a lot of entropy with naturally without having to put it explicitly in a form of a crypto key. So these are people like people you've dated, people in your family, the really close friends in your life. So my question is, can we use this huge amount of shared experience that you have with these people to do cryptography.

Original languageEnglish (US)
Title of host publicationSecurity Protocols XVII - 17th International Workshop, Revised Selected Papers
PublisherSpringer Verlag
Pages199-212
Number of pages14
ISBN (Print)9783642362125
DOIs
StatePublished - 2013
Event17th International Security Protocols Workshop - Cambridge, United Kingdom
Duration: Apr 1 2009Apr 3 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7028 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other17th International Security Protocols Workshop
Country/TerritoryUnited Kingdom
CityCambridge
Period4/1/094/3/09

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Alice and Bob in love (transcript of discussion)'. Together they form a unique fingerprint.

Cite this