Page 126 - Kaleidoscope Academic Conference Proceedings 2021
P. 126

2021 ITU Kaleidoscope Academic Conference











































                         Figure 4 – Schematic diagram of Confidential Disclosure based on Randomness beacon.



           only if Alice can provide the following three items:  random number generated by the beacon and not send her
           1) Produce Bob’s signed reference value        of       .  signed cryptodecoding key to Bob in the meantime, thus
           2) Produce Bob’s signed message (      ,    0 +    Δ  ).  successfully cheating.  It is important to ensure that the
           3) Produce the beacon-signed message (      ,    0 +    Δ  ).  beacons satisfy unpredictability and autonomy.
           Alice will also pass the secret        as specified unless Bob
           can provide both of the following two items:          5.  CONCLUSION AND STANDARDIZATION
           1) Produce Alice’s signed message of encrypted decoding key            PROGRESS
               (  (  )).
                      
           2) Prove that the decoding key   (  ) is not for the encryption  In this paper, we propose the concept of DIQRNG with higher
           key   .                                            security for the security of ICT services and information
           Moreover, the randomness beacon service always generates  infrastructure integration, in preparation for the future
                                                              cybersecurity facing more powerful computing capabilities.
           a signed random number with encryption key and decoding
                                                              We introduce an architectural framework as an entropy source
           key at time    0 +    Δ  . If the range of the random number is
                                                              for randomness beacons and depict the complete trust chain.
           [0,    −1], the expected time for honest parties to complete the
                                                              In order to apply DIQRNG to a wider range of scenarios,
           disclosure will be   Δ  . On the other hand, if Alice intends
                                                              we can combine it with networks. We also present contract
           to cheat Bob, she will not send her signed cryptodecoding
                                                              signing and confidential disclosure as an example in detail.
           key to Bob during [  ,    + Δ  ]. The only possible scenario
                                                              It is foreseeable that DIQRNG, as a public random resource,
           in which she could succeed is that the random number
                                                              will have a greater development in future ICT infrastructure.
           and decoding key generated by the messenger at    + Δ  
           overlaps with the minimum random number       and the key  Currently, many standardization organizations, including
                    that they used most recently at   . Therefore, she can  ITU, have noticed the importance of standardization of
           generate the information in the request presented above,  quantum random numbers. ITU has published the standard
           which convinces the adjudicator that Bob has committed  architecture [5] for quantum noise random number generators,
           to receive, evading providing Bob with       . This event  and QIT4N focus groups have conducted standardization
           occurs with probability 1/  . However, if Bob intends to  studies on DIQRNG and randomness beacon use cases. It
           deceive Alice by not sending her his signed receipt, this will  is necessary to expand the scope of these standards to find
           immediately lead to the termination of the agreement. More  more use cases that reflect the availability and reliability
           importantly, if Alice can anticipate the beacon message, she  of DIQRNG, and to plan ahead for addressing the security
           will manipulate her random number    to coincide with the  of random numbers in future ICT infrastructures.  In




                                                           – 64 –
   121   122   123   124   125   126   127   128   129   130   131