scispace - formally typeset
Search or ask a question

Showing papers on "Trusted third party published in 1995"


Journal ArticleDOI
01 Jun 1995
TL;DR: The description of a conditional access system is given and it is shown that equitable systems need the use of a trusted third party.
Abstract: Digital TV broadcasting needs new cryptological tools for conditional access, copyright protection and image authentication. The aim of this paper is to overview the corresponding systems' features. The description of a conditional access system is given. It is shown that equitable systems need the use of a trusted third party. The design of efficient copyright protection by watermarking images and image authentication by signatures are also briefly discussed. >

486 citations


Patent
20 Mar 1995
TL;DR: In this paper, the verification information is provided with respect to a transaction between an initiating party and a verification-seeking party, the verification being given by a third, verifying party, based on confidential information in the possession of the initiating party.
Abstract: Verification information is provided with respect to a transaction between an initiating party and a verification-seeking party, the verification information being given by a third, verifying party, based on confidential information in the possession of the initiating party. On behalf of the initiating party, first and second tokens are generated, each of which represents some but not all of the confidential information. The first token is sent electronically via a nonsecure communication network from the initiating party to the verification-seeking party. The second token is sent electronically via a nonsecure communication network from the initiating party to the verifying party. Verification information is sent electronically via a nonsecure communication network from the verifying party to the verification-seeking party. The invention is useful, for example, in obtaining authorization of credit card transactions made via a nonsecure communication network, such as the INTERNET, while reducing the chance for credit card fraud.

405 citations


Patent
28 Aug 1995
TL;DR: In this article, a process for using a trusted third party to create an electronic certificate for an electronic file that can be used to establish the file and verify the identity of the creator of the file is described.
Abstract: A process for using a trusted third party to create an electronic certificate for an electronic file that can be used to establish the file and verify the identity of the creator of the file. The process is composed of two phases, a registration phase and an electronic file distribution phase. In the registration phase, a trusted third party receives information about an author, including the author's public key and affirmatively verifies the accuracy of this information. In the file distribution phase, an author sends to the trusted third party a signed message containing the hash of the file the author wants to distribute. The trusted third party creates an electronic certificate, signed by the trusted third party, containing the hash of the file sent by the author. A user desiring to receive the file, retrieves the file with the certificate an uses the certificate to verifies, first, that the certificate was created by the trusted third party, and, second, that the hash of the file in the certificate is the same as the hash that is computed from the retrieved file. If these two hash's match, then the user is assured that the file did originate with the author and is uncorrupted.

248 citations


Book ChapterDOI
03 Jul 1995
TL;DR: A novel solution to the problem of providing trusted third party services, such as the management of cryptographic keys for end-to-end encryption, in a way that meets legal requirements for warranted interception is proposed.
Abstract: In this paper we propose a novel solution to the problem of providing trusted third party services, such as the management of cryptographic keys for end-to-end encryption, in a way that meets legal requirements for warranted interception. Also included is a discussion of what might be a reasonable set of requirements for international provision of such services, as well as some analysis of the cryptographic properties of the architecture and how it might operate in practice.

99 citations


Journal ArticleDOI
TL;DR: A new work item has been defined on non-repudiation techniques using asymmetric (digital signatures) as well as symmetric cryptographic techniques.

84 citations


Book ChapterDOI
20 Nov 1995
TL;DR: It is shown that equitable systems need the use of a Trusted Third Party, and a possible solution is presented.
Abstract: Image communication needs new cryptological tools for conditional access, copyright protection and image authentication. The aim of this paper is to overview the corresponding systems' features. The design of efficient copyright protection by watermarking images and image authentication by signatures is also briefly discussed. It is shown that equitable systems need the use of a Trusted Third Party, and a possible solution is presented. The implementation of this new function in the multimedia world strongly differs from that in the Electronic Data Interchange environment where it is already well known. This difference will also be detailed.

72 citations


Journal ArticleDOI
TL;DR: Bellcore's Trusted Software Integrity (Betsi) System, an implementation of the design, is presented and a detailed design is provided.

28 citations



Book ChapterDOI
01 Jan 1995
TL;DR: Auctioning of livestock by satellite broadcast is a new and rapidly expanding service within Europe as discussed by the authors, which has enormous potential for further expansion into other agricultural commodities and other areas, such as marine equipment, fine art, large machinery, vehicles, etc.
Abstract: Auctioning of livestock by satellite broadcast is a new and rapidly expanding service within Europe. The concept has enormous potential for further expansion into other agricultural commodities and other areas, such as marine equipment, fine art, large machinery, vehicles, etc. It updates the age-old method of competitive buying and selling, by incorporating forms of teleworking and electronic commerce into a system that reduces the amount of travelling and movement of goods, especially important when operating on a larger scale.

3 citations


Book ChapterDOI
01 Jan 1995
TL;DR: A Licensing Trusted Third Party (LTTP) employing a minimum of dedicated security hardware is proposed as an intermediate solution, an “add-on” to currently existing systems without the security pitfalls of today’ s licensing mechanisms and which assumes less trust in the license administrators.
Abstract: Licensing is a topic of increasing importance for software publishers and users. More and more, software licensing is performed electronically by mechanisms running on the system on which the licensed software operates. In order to facilitate the use and management of such licensing systems and to enable economic software usage in enterprise-wide computer systems, various organizations are formulating requirements and defining architectures and standard interfaces for license systems. The trustworthiness of these systems is essential because large amounts of revenue can depend on them. A long term solution called Stateful Access Control (SAC) has been proposed, which aims for maximal flexibility in the definition of the license policy and still minimizes the restrictions inferred by the system. To achieve a satisfactory long-term solution like SAC requires a perfectly orchestrated effort by all partners reaching from the hardware and operating system provider to the application developer. Because this cannot be expected to happen all at once, migration strategies must be developed with modes of operation pursuing an optimum for not yet totally satisfactory intermediary states. Tamper Evidence is the “weak” security level addressed by this paper. A Licensing Trusted Third Party (LTTP) employing a minimum of dedicated security hardware is proposed as such an intermediate solution. It is an “add-on” to currently existing systems without the security pitfalls of today’ s licensing mechanisms and which assumes less trust in the license administrators.

1 citations


01 Jun 1995
TL;DR: This protocol is intended for the distribution of software, data, documents, and any other file that is subject to malicious modification and is intended to provide assurances of integrity and time.
Abstract: This memo describes a protocol for adding integrity assurance to files that are distributed across the Internet. This protocol is intended for the distribution of software, data, documents, and any other file that is subject to malicious modification. The protocol described here is intended to provide assurances of integrity and time. A trusted third party is required.