Proceedings ArticleDOI
Key distribution without individual trusted authentification servers
Liqun Chen,Dieter Gollmann,Chris J. Mitchell +2 more
- pp 30-36
TLDR
This paper proposes two key distribution protocols with multiple authentication servers using a cross checksum scheme based on the use of symmetric encryption for verifying the origin and integrity of messages.Abstract:
Some recent research on key distribution systems has focussed on analysing trust in authentication servers, and constructing key distribution protocols which operate using a number of authentication servers, which have the property that a minority of them may be untrustworthy. This paper proposes two key distribution protocols with multiple authentication servers using a cross checksum scheme. Both protocol are based on the use of symmetric encryption for verifying the origin and integrity of messages. In these protocols it is not necessary for clients to trust an individual authentication server. A minority of malicious and colluding servers cannot compromise security and can be detected. The first 'parallel' protocol can prevent a minority of servers disrupting the service. The second 'cascade' protocol has to work with other security mechanisms in order to prevent a server breaking the procedure by refusing to cooperate. As compared with other proposed protocols with similar properties these two protocols require less exchanged messages.read more
Citations
More filters
Book
Protocols for Authentication and Key Establishment
Colin Boyd,Anish Mathuria +1 more
TL;DR: This is the first comprehensive and integrated treatment of protocols for authentication and key establishment, which allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
Patent
Integrity protection of streamed content
TL;DR: In this article, the authors proposed a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic devices applying Digital Rights Management (DRM), where a master integrity key is obtained in a streaming node.
Book ChapterDOI
Key Escrow in Mutually Mistrusting Domains
TL;DR: A key escrow system which meets possible requirements for international key Escrow, where different domains may not trust each other, and two escrowed key agreement mechanisms, both designed for the case where the pair of communicating users are in different domains.
Proceedings ArticleDOI
The Ω key management service
TL;DR: The design of R, the protocols underlying its operation, performance in the present implementation, and an experimental application of the service are described.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings Article
A Threshold Cryptosystem without a Trusted Party (Extended abstract)
TL;DR: In a threshold cryptosystem n members share the necret key of an organization such that k members must cooperate in order to decipher a given uphertext, it is shown how to implement a scheme without having a trusted party, which selects the secret key and distributes it to the members.
Book ChapterDOI
A threshold cryptosystem without a trusted party
TL;DR: In this article, it is shown how to implement a threshold cryptosystem without having a trusted party, which selects the secret key and distributes it to the members, in stead, the members choose the key and distribute it verifiably among themselves.
Journal ArticleDOI
Increasing availability and security of an authentication service
TL;DR: A general solution in which the authentication server is replicated so that a minority of malicious and colluding servers cannot compromise security or disrupt service is proposed.
Book ChapterDOI
Generalized linear threshold scheme
TL;DR: The generalized linear scheme is used to provide a hierarchical threshold scheme which allows multiple thresholds necessary in a hierarchical environment.