Authentication in multi tier system using commutative encryption and proxysignatures | Vestnik Tomskogo gosudarstvennogo universiteta. Upravlenie, vychislitelnaja tehnika i informatika – Tomsk State University Journal of Control and Computer Science. 2010. № 4(13).

Authentication in multi tier system using commutative encryption and proxysignatures

The paper considers the trusted subsystem model of authentication in multi tier system. The considered system consists of three subsystems: client, front-end server, back-end server. Client interacts only with front-end server, front-end server interacts with client and with the back-end server. In trusted subsystem model front-end server interacts with the back-end server using fixed number of credentials, i.e. one back-end server credential corresponds to several clients of front-end server. The development of authentication protocol with following properties is considered: front-end server can only use credential corresponding to current client, when interacting with back-end server; front-end server can not start interaction with back-end server without client. The paper suggests two protocols satisfying these requirements. First protocol is build using commutative encryption, and second one is using proxy signatures. Also, for the first protocol, some specific commutative encryption algorithms are considered.

Download file
Counter downloads: 366

Keywords

многоуровневые системы, аутентификация в многоуровневых системах, коммутативное шифрование, доверенные подписи, multi-tier systems, authentication in multi-tier systems, commutative encryption, proxy signatures

Authors

NameOrganizationE-mail
Pautov P.A.Tomsk State University__Pavel__@mail.ru
Всего: 1

References

Mambo M.M., Usuda K., Okmamoto E. Proxy signatures: delegation of the power to sign message // IEICE Transaction Functional E79-A. 1996. V. 9. P. 1338-1354.
Weis S. New foundations for efficient authentication, commutative cryptography, and private disjointness testing. MIT, 2006.
Weiliang Zhao, Vijay Varadharajan, Yi Mu. A secure mental poker protocol over the Internet // ACSW Frontiers. 2003. P. 105-109.
Feng Bao, Robert H. Deng, Peirong Feng. An efficient and practical scheme for privacy protection in the e-commerce of digital goods // ICISC 2000, LNCS 2015. 2001. P. 162-170.
Schneier B. Applied cryptography: protocols, algorithms, and source code in C, Second Edition. Wiley, 1996. 785 p.
Chong F. Trusted subsystem design // MSDN. 2006. URL: <http://msdn.microsoft.com/en-us/>library/aa905320.aspx
Паутов П.А. Проблема аутентификации в многоуровневых приложениях // Прикладная дискретная математика. 2008. № 2. С. 87-90.
 Authentication in multi tier system using commutative encryption and proxysignatures | Vestnik Tomskogo gosudarstvennogo universiteta. Upravlenie, vychislitelnaja tehnika i informatika – Tomsk State University Journal of Control and Computer Science. 2010. № 4(13).

Authentication in multi tier system using commutative encryption and proxysignatures | Vestnik Tomskogo gosudarstvennogo universiteta. Upravlenie, vychislitelnaja tehnika i informatika – Tomsk State University Journal of Control and Computer Science. 2010. № 4(13).

Download file