scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Book ChapterDOI
03 Jun 2013
TL;DR: This work introduces a construction for publish-subscribe overlays that fulfills the requirements of security and privacy requirements for such systems, including an adversary model for privacy.
Abstract: Publish-subscribe is a scheme for distributing information based on interests. While security mechanisms have been added to publish-subscribe, privacy, in particular anonymous communication is hardly considered. We summarize security and privacy requirements for such systems, including an adversary model for privacy. We introduce a construction for publish-subscribe overlays that fulfills the requirements. Contrary to previous approaches, it does neither presume an online trusted third party, nor expensive cryptographic operations performed by brokers. Further, we informally discuss how our requirements are met.

12 citations

Patent
14 Dec 2009
TL;DR: In this article, a computer-implemented method for a first user to verify an association with a second user through a secret handshake protocol includes maintaining information about a reusable identification handle for the first user, where the information about the reusable ID handle is provided by a trusted third party, maintaining a reusable credential for the second user, and maintaining a matching reference for verifying another user's association with another user.
Abstract: According to a general aspect, a computer-implemented method for a first user to verify an association with a second user through a secret handshake protocol includes maintaining information about a reusable identification handle for the first user, where the information about the reusable identification handle is provided by a trusted third party, maintaining information about a reusable credential for the first user, where the information about the reusable credential is provided by a trusted third party, and maintaining information about a matching reference for verifying an association with another user, where the information about the matching reference is provided by a trusted third party. Information based on the reusable identification handle and based on the reusable credential is transmitted to a potential peer. First information based on a reusable identification handle for the second user is received, and second information based on a reusable credential for the second user is received. A first comparison of a combination of the first information and the second information is performed with the matching reference to determine whether the second user's credentials match the first users matching reference. A second comparison of the first information with information published on a revocation list is performed to determine whether the second user's credentials have been revoked from usage. Based on the first comparison and the second comparison, a determination is made whether or not to verify the association of second user with the first user.

12 citations

Proceedings ArticleDOI
11 May 2015
TL;DR: An ecosystem consisting of a Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future services.
Abstract: Currently the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed for the future 5G networks. The paper concludes that an ecosystem consisting of a Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future services.

12 citations

Journal ArticleDOI
TL;DR: In this article, the authors explore the potential role of blockchain technology in the aviation industry and highlight the key opportunities brought about by blockchain technology for various aviation applications, including digitizing crew certificates, securing customer loyalty programs, and maintenance, repair and overhaul operations.
Abstract: The current systems used to manage data in aviation industries are mostly centralized and fall short of ensuring trusted data provenance, immutability, transparency, auditablility, and traceability features. Blockchain is an emerging and disruptive technology that has a high potential to provide trusted traceability, transparency, auditability, and immutability for stored and exchanged data and transactions in a manner that is decentralized and secure without the involvement of trusted third party. In this article, we explore the potential role of blockchain technology in the aviation industry. We highlight and discuss the key opportunities brought about by blockchain technology in various aviation applications, including digitizing crew certificates, securing customer loyalty programs, and maintenance, repair, and overhaul operations. We present recently reported case studies that have leveraged blockchain technology to provide aviation-centric services. Furthermore, we introduce a framework that leverages blockchain-based smart contracts to automate the key services in the aviation industry. Finally, we highlight open research issues and challenges.

12 citations

Posted Content
TL;DR: This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack and presents a method for protecting against such an attack using certificates distributed by a trusted third party.
Abstract: This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.

12 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177