Title :
Securely replicating authentication services
Author_Institution :
Comput. Lab., Cambridge Univ., UK
Abstract :
A framework for designing a type of distributed authentication protocol is given, whose security and availability are higher compared to those of centralized ones. It uses the technique of secret sharing and introduces a cross checksum scheme to achieve secure replication. Fewer than a certain number of malicious servers cannot damage security except by causing denial of service, and this only happens when too many honest servers accidentally fail at the same time. The protocol is suited to an environment where no trustworthiness of any server is permanently guaranteed. The approach is general enough not to rely on any particular authentication protocol. Existing implementations need minor modification. Only a short piece of code is needed to run the implementations as many times as required. Hence, different centralized protocols can be incorporated into one distributed protocol
Keywords :
distributed processing; protocols; security of data; availability; code; cross checksum scheme; denial of service; distributed authentication protocol; environment; honest servers; malicious servers; secret sharing; secure replication; securely replicating authentication services; security; trustworthiness; Authentication; Availability; Counting circuits; Cryptography; Hardware; Information security; Knowledge based systems; Network servers; Protocols;
Conference_Titel :
Distributed Computing Systems, 1989., 9th International Conference on
Conference_Location :
Newport Beach, CA
Print_ISBN :
0-8186-1953-8
DOI :
10.1109/ICDCS.1989.37934