
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | August 14, 2007 |
Latest Amendment Date: | July 23, 2009 |
Award Number: | 0716790 |
Award Instrument: | Continuing Grant |
Program Manager: |
Nina Amla
namla@nsf.gov (703)292-7991 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | August 1, 2007 |
End Date: | July 31, 2011 (Estimated) |
Total Intended Award Amount: | $398,600.00 |
Total Awarded Amount to Date: | $398,600.00 |
Funds Obligated to Date: |
FY 2008 = $100,000.00 FY 2009 = $98,600.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
9500 GILMAN DR LA JOLLA CA US 92093-0021 (858)534-4896 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
9500 GILMAN DR LA JOLLA CA US 92093-0021 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
THEORY OF COMPUTING, CYBER TRUST, TRUSTWORTHY COMPUTING |
Primary Program Source: |
01000809DB NSF RESEARCH & RELATED ACTIVIT 01000910DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Over the next few years, the basic architecture of the next generation of Internet will be decided, hopefully with a much greater emphasis on security. In a network, security and communication are interdependent. Cryptographic tools will be required to ensure that communication is dependable despite hackers' denial-of-service attacks and other sabotage. On the other hand, proper communications architecture could provide primitives that make powerful cryptographic tools for security, such as secure multiparty computation, e_cient enough to be implemented. Unfortunately, research on reliable communications and computation in a network has traditionally been studied without consideration of security, and vice versa. This research examines a model of communication channels that includes security considerations in a robust way. In this model, protocols can be simultaneously evaluated for the two dual objectives of secrecy and reliability. This model unites previous approaches to these questions from the points of view of cryptography, distributed systems, and error-correction. The model also unites information-theoretic techniques (with security based on the attacker's inability to access certain information) with complexitytheoretic approaches (based on the attacker's inability to solve intractable computational problems). Possible constructions of channels with stronger properties (increased privacy, authentication, or reliability) from those with weaker properties will be explored. For example, is it possible to take an arbitrary channel that gives only slightly more information to the intended receiver than to an attacker and use it to build a highly reliable and almost completely secret channel? Can we use a channel for secret, reliable communication to create a channel emulating a virtual broadcast? What is the relationship between secrecy and anonymity?
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.