scispace - formally typeset
Search or ask a question
Topic

Trusted third party

About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.


Papers
More filters
Patent
02 Apr 2003
TL;DR: In this paper, the authors present a system and method for facilitating a transaction between two or more parties, where electronic documents are received from a party and posted to the secured account such that each party can retrieve and modify the electronic documents.
Abstract: The present invention provides a system and method for facilitating a transaction between two or more parties. Electronic documents are received from a party and are posted to the secured account such that each party can retrieve and modify the electronic documents. Changes are made to the electronic documents and all or part of the electronic documents are locked against future changes as they are agreed upon by the parties. Upon agreement, the electronically signed documents are provided to the parties. The present invention also provides a method for facilitating a proposed transaction between an originating party and a potential buying party using various levels of unrestricted and restricted descriptions of the proposed transaction tied to conditions of release. The requested restricted description is provided to the potential buying party whenever the potential buying party agrees to the one or more conditions of release for the requested restricted description.

75 citations

Patent
02 Jan 2003
TL;DR: In this article, the authors propose a key management protocol that uses the concept of tickets to provide third party authentication when requesting content and/or services from an application server, where a client is coupled with a third party application server and the first application server returns a key reply if the third party server information is authenticated and client authorization is verified.
Abstract: A method and system (100) for providing third party authentication when requesting content and/or services from an application server (106). The method is applicable to key management protocols that utilize the concept of tickets. The method and system include a client (102) being coupled with a third party application server (107), wherein the client submits a request for content from the third party application server and the third party application server returns requested information and corresponding authentication. The client further couples with a first application server (106), wherein the client submits a key request (KEY_REQ) including the third party server information and corresponding authentication to the first application server. The first application server authenticates the third party server information and verifies client authorization based on third party information. The first application server returns a key reply (KEY_REP) if the third party server information is authenticated and client authorization is verified.

75 citations

Journal ArticleDOI
01 Mar 2012
TL;DR: This work considers ownership transfer scenarios for single tag-single owner with and without a trusted third party (TTP) and proposes protocols that are lightweight and secure from a cryptography perspective.
Abstract: Security/privacy issues are of paramount importance for widespread acceptance and use of radio-frequency identification (RFID) tags. Over the last few years, researchers have addressed this issue through lightweight cryptographic means. While a majority of existing RFID security/privacy protocols address authentication issues, the ability to change as well as share ownership of these tagged objects is equally important. We consider a few RFID ownership transfer variations and propose protocols that are lightweight and secure. We consider ownership transfer scenarios for single tag-single owner with and without a trusted third party (TTP). We provide security analysis to evaluate the accuracy, confidentiality, and forward security of the proposed protocols from a cryptography perspective.

75 citations

Journal ArticleDOI
01 Oct 2014
TL;DR: A novel secure group sharing framework for public cloud, which can effectively take advantage of the cloud servers' help but have no sensitive data being exposed to attackers and the cloud provider is proposed.
Abstract: With the popularity of group data sharing in public cloud computing, the privacy and security of group sharing data have become two major issues. The cloud provider cannot be treated as a trusted third party because of its semi-trust nature, and thus the traditional security models cannot be straightforwardly generalized into cloud based group sharing frameworks. In this paper, we propose a novel secure group sharing framework for public cloud, which can effectively take advantage of the cloud servers’ help but have no sensitive data being exposed to attackers and the cloud provider. The framework combines proxy signature, enhanced TGDH and proxy re-encryption together into a protocol. By applying the proxy signature technique, the group leader can effectively grant the privilege of group management to one or more chosen group members. The enhanced TGDH scheme enables the group to negotiate and update the group key pairs with the help of cloud servers, which does not require all of the group members been online all the time. By adopting proxy re-encryption, most computationally intensive operations can be delegated to cloud servers without disclosing any private information. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.

74 citations

Patent
01 Feb 2002
TL;DR: In this paper, a method for structuring a transaction involving a first party having a long position in a security and a second party desiring to acquire short exposure to the security is presented.
Abstract: In one embodiment the present invention relates to a method for structuring a transaction involving a first party having a long position in a security and a second party desiring to acquire short exposure to the security. In one example an agent or intermediary acts between the first party and the second party. In another example the first party and the second party deal directly with one another.

74 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Server
79.5K papers, 1.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Mobile computing
51.3K papers, 1M citations
83% related
Network packet
159.7K papers, 2.2M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202321
202240
2021125
2020201
2019179
2018177