Access Restriction

Author Booth, Kellogg S.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Keyword Authentication ♦ Notary ♦ Digital signatures ♦ Public key encryption
Abstract One of Needham and Schroeder's proposed signature authentication protocols is shown to fail when there is a possibility of compromised keys: this invalidates one of the applications of their technique. A more elaborate mechanism is proposed which does not require a network clock, but does require a third party to the transaction. The latter approach is shown to be reliable in a fairly strong sense.
Description Affiliation: Univ. of Waterloo, Waterloo, Ontario, Canada (Booth, Kellogg S.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 24
Issue Number 11
Page Count 3
Starting Page 772
Ending Page 774

Open content in new tab

   Open content in new tab
Source: ACM Digital Library