Title :
Reliability and Key-Protection for Computer-Security Systems
Author :
Wu, Tsong-Ho ; Chen, Kim-Joan
Author_Institution :
Bell Communications Research; 331 Newman Springs Rd.; Red Bank, New Jersey 07701 USA.
fDate :
4/1/1987 12:00:00 AM
Abstract :
The threshold scheme is an approach to ease the trade-off between the master-key protection and system reliability in computer security systems where the encryption method is implemented. This paper proposes a model to investigate the quantitative relationship among key protection, key recovery, and threshold selection. An algorithm based on this relationship is developed to select an appropriate threshold against the design goal. The numerical simulation recommends that the threshold parameters in a trusted environment can be smaller, while those must be larger and close to each other in a hostile environment to overcome its defect.
Keywords :
Algorithm design and analysis; Computer security; Cryptography; Numerical simulation; Partitioning algorithms; Performance analysis; Protection; Protocols; Reliability; Upper bound; Computer security; Key protection; Optimized threshold scheme;
Journal_Title :
Reliability, IEEE Transactions on
DOI :
10.1109/TR.1987.5222313