Transporting a Secret using Destructively-Read Memory
Christianson, Bruce and Shafarenko, Alex
(2023)
Transporting a Secret using Destructively-Read Memory.
In: UNSPECIFIED.
Alice wants to send Bob a secret such as a one-time pad. Our proposal is to use a specially designed mass-produced memory chip, rather like a flash drive, called a DeRM (Destructive-Read Memory). As with other distribution methods, including tamper-evident containers and QKD, we require a side-channel that provides end-point authentication and message integrity (although not message secrecy). Advantages of the DeRM over other tamper-evident containers include that DeRMs can be clonable, and correct verification that the DeRM has not been accessed in transit is ensured by the process of extracting the secret content.
| Item Type | Conference or Workshop Item (Other) |
|---|---|
| Identification Number | 10.1007/978-3-031-43033-6_3 |
| Additional information | © 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG. This is the accepted manuscript version of an article which has been published in final form at https://doi.org/10.1007/978-3-031-43033-6_3 |
| Date Deposited | 15 May 2025 16:49 |
| Last Modified | 23 Oct 2025 00:11 |
-
picture_as_pdf - DeRM_2.pdf
-
subject - Submitted Version
-
copyright - Available under Unspecified
Share this file
Downloads