DocumentCode :
2734479
Title :
Key distribution without individual trusted authentification servers
Author :
Chen, L. ; Gollmann, D. ; Mitchell, C.
Author_Institution :
Inf. Security Group, London Univ., UK
fYear :
1995
fDate :
13-15 Jun 1995
Firstpage :
30
Lastpage :
36
Abstract :
Some recent research on key distribution systems has focussed on analysing trust in authentication servers, and constructing key distribution protocols which operate using a number of authentication servers, which have the property that a minority of them may be untrustworthy. This paper proposes two key distribution protocols with multiple authentication servers using a cross checksum scheme. Both protocol are based on the use of symmetric encryption for verifying the origin and integrity of messages. In these protocols it is not necessary for clients to trust an individual authentication server. A minority of malicious and colluding servers cannot compromise security and can be detected. The first `parallel´ protocol can prevent a minority of servers disrupting the service. The second `cascade´ protocol has to work with other security mechanisms in order to prevent a server breaking the procedure by refusing to cooperate. As compared with other proposed protocols with similar properties these two protocols require less exchanged messages
Keywords :
cryptography; message authentication; protocols; authentication servers; cross checksum scheme; data integrity; key distribution protocols; key distribution systems; symmetric encryption; trust; Authentication; Cryptographic protocols; Cryptography; Diffusion tensor imaging; History; Information analysis; Information security; Vents;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 1995. Proceedings., Eighth IEEE
Conference_Location :
County Kerry
ISSN :
1063-6900
Print_ISBN :
0-8186-7033-9
Type :
conf
DOI :
10.1109/CSFW.1995.518550
Filename :
518550
Link To Document :
بازگشت