Interesting Esoterica

Cryptographic Protocols with Everyday Objects

Article by James Heather and Steve Schneider and Vanessa Teague
  • Published in 2011
  • Added on
Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes.

Links


BibTeX entry

@article{CryptographicProtocolsWithEverydayObjects,
	title = {Cryptographic Protocols with Everyday Objects},
	author = {James Heather and Steve Schneider and Vanessa Teague},
	url = {http://www.computing.surrey.ac.uk/personal/st/S.Schneider/papers/2011/cryptoforma11a.pdf},
	urldate = {2016-11-17},
	abstract = {Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access
to some sort of computational device. 

However, there are times when there is need for a security mechanism
to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for
solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes.},
	comment = {},
	collections = {Protocols and strategies,Things to make and do},
	year = 2011
}