scispace - formally typeset
Proceedings ArticleDOI

Key distribution without individual trusted authentification servers

TLDR
This paper proposes two key distribution protocols with multiple authentication servers using a cross checksum scheme based on the use of symmetric encryption for verifying the origin and integrity of messages.
Abstract
Some recent research on key distribution systems has focussed on analysing trust in authentication servers, and constructing key distribution protocols which operate using a number of authentication servers, which have the property that a minority of them may be untrustworthy. This paper proposes two key distribution protocols with multiple authentication servers using a cross checksum scheme. Both protocol are based on the use of symmetric encryption for verifying the origin and integrity of messages. In these protocols it is not necessary for clients to trust an individual authentication server. A minority of malicious and colluding servers cannot compromise security and can be detected. The first 'parallel' protocol can prevent a minority of servers disrupting the service. The second 'cascade' protocol has to work with other security mechanisms in order to prevent a server breaking the procedure by refusing to cooperate. As compared with other proposed protocols with similar properties these two protocols require less exchanged messages.

read more

Citations
More filters
Book

Protocols for Authentication and Key Establishment

Colin Boyd, +1 more
TL;DR: This is the first comprehensive and integrated treatment of protocols for authentication and key establishment, which allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
Patent

Integrity protection of streamed content

TL;DR: In this article, the authors proposed a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic devices applying Digital Rights Management (DRM), where a master integrity key is obtained in a streaming node.
Book ChapterDOI

Key Escrow in Mutually Mistrusting Domains

TL;DR: A key escrow system which meets possible requirements for international key Escrow, where different domains may not trust each other, and two escrowed key agreement mechanisms, both designed for the case where the pair of communicating users are in different domains.
Proceedings ArticleDOI

The Ω key management service

TL;DR: The design of R, the protocols underlying its operation, performance in the present implementation, and an experimental application of the service are described.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings Article

A Threshold Cryptosystem without a Trusted Party (Extended abstract)

TL;DR: In a threshold cryptosystem n members share the necret key of an organization such that k members must cooperate in order to decipher a given uphertext, it is shown how to implement a scheme without having a trusted party, which selects the secret key and distributes it to the members.
Book ChapterDOI

A threshold cryptosystem without a trusted party

TL;DR: In this article, it is shown how to implement a threshold cryptosystem without having a trusted party, which selects the secret key and distributes it to the members, in stead, the members choose the key and distribute it verifiably among themselves.
Journal ArticleDOI

Increasing availability and security of an authentication service

TL;DR: A general solution in which the authentication server is replicated so that a minority of malicious and colluding servers cannot compromise security or disrupt service is proposed.
Book ChapterDOI

Generalized linear threshold scheme

TL;DR: The generalized linear scheme is used to provide a hierarchical threshold scheme which allows multiple thresholds necessary in a hierarchical environment.