scispace - formally typeset
Search or ask a question

Showing papers on "Trusted third party published in 1990"


Journal ArticleDOI
TL;DR: This work compares two rather different approaches using third parties to provide security by third parties identifying perpetrators in cases of detected fraud, whereas the second uses a third party as trustee who takes an active part in the value exchange and can be completely controlled by each absolutely anonymous party.

131 citations


Patent
17 Dec 1990
TL;DR: In this paper, the first party encrypts a key shared with the second party with the first parties' second key and transmits this to the second parties, then uses its copy of the key to encrypt information.
Abstract: A method and system for authenication of communications. More particularly the subject application discloses a method and apparatus whereby a third party may validate that a communication is an authentic communication from a second party sent with the authorization of a first party. For example, the third party may be a postal service, the second party may be a mailer, and the communication may be a postal indicia showing that a mail piece has been properly franked. The first party and the second party share an encryption key, or a series of keys. The first party also has a second encryption key which the third party has the ability to decrypted. In the subject invention the first party encrypts a key shared with the second party with the first party's second key and transmits this to the second party. The second party then uses its copy of the key to encrypt information and appends its encrypted information to the message received from the first party and transmits all this to the third party. The third party may then decrypt the copy of the key encrypted by the first party and use this information to decrypt the information encrypted by the second party. The known technique of eliptical logarithms may be used to provide highly secure encryption of short messages. The second party may be a mailer and the apparatus of the subject invention may include a postage meter which prints the information transmitted to the third party, who may be a postal service, on a mail piece as a postal indicia.

98 citations


Journal ArticleDOI
TL;DR: Modifications of Rabin's protocols are suggested, so that new versions of protocols may be used to implement the same security services, but with better operational efficiency.

3 citations


Book ChapterDOI
31 Jan 1990

3 citations