AUTHENTICATION AND DELEGATION WITH SMART-CARDS

被引:29
|
作者
ABADI, M
BURROWS, M
KAUFMAN, C
LAMPSON, B
机构
[1] DIGITAL EQUIPMENT CORP, SYST RES CTR, PALO ALTO, CA 94301 USA
[2] DIGITAL EQUIPMENT CORP, TELECOMMUN & NETWORKS, LITTLETON, MA 01460 USA
关键词
D O I
10.1016/0167-6423(93)90002-7
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The authentication of users in distributed systems poses special problems because users lack the ability to encrypt and decrypt. The same problems arise when users wish to delegate some of their authority to nodes, after mutual authentication. In most systems today, the user is forced to trust the node he wants to use. In a more satisfactory design, the user carries a smart-card with sufficient computing power to assist him; the card provides encryption and decryption capabilities for authentication and delegation. Authentication is relatively straightforward with a powerful enough smart-card. However, for practical reasons, protocols that place few demands on smart-cards should be considered. These protocols are subtle, as they rely on fairly complex trust relations between the principals in the system (users, hosts, services). In this paper, we discuss a range of public-key smart-card protocols, and analyze their assumptions and the guarantees they offer.
引用
收藏
页码:93 / 113
页数:21
相关论文
共 50 条
  • [1] AUTHENTICATION AND DELEGATION WITH SMART-CARDS
    ABADI, M
    BURROWS, M
    KAUFMAN, C
    LAMPSON, B
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 526 : 326 - 345
  • [2] Strong Virtual Network Authentication using EAP-TLS Smart-Cards
    Guenane, Fouad Amine
    Pujolle, Guy
    [J]. 2012 IEEE 1ST INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2012,
  • [3] A pairing SW implementation for smart-cards
    Bertoni, Guido M.
    Breveglieri, Luca
    Chen, Liqun
    Fragneto, Pasqualina
    Harrison, Keith A.
    Pelosi, Gerardo
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1240 - 1247
  • [4] A realistic approach on password-based mutual remote authentication schemes with smart-cards
    Torres, Joaquin
    Sierra, Jose M.
    Izquierdo, Antonio
    [J]. 2007 INAUGURAL IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2007, : 384 - +
  • [5] Efficient modular multiplication for programmable smart-cards
    Malina, Lukas
    Hajny, Jan
    [J]. TELECOMMUNICATION SYSTEMS, 2014, 55 (04) : 491 - 498
  • [6] Efficient modular multiplication for programmable smart-cards
    Lukas Malina
    Jan Hajny
    [J]. Telecommunication Systems, 2014, 55 : 491 - 498
  • [7] Delegation and not-so smart cards
    Christianson, B
    Malcolm, JA
    [J]. SECURITY PROTOCOLS, 1999, 1550 : 154 - 167
  • [8] Efficient Biometric Palm-Print Matching on Smart-Cards
    Wyant, Rafael Soares
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, PART VI - ICCSA 2014, 2014, 8584 : 236 - 247
  • [9] Mutual authentication with smart cards
    Bakker, B
    [J]. PROCEEDINGS OF THE USENIX WORKSHOP ON SMARTCARD TECHNOLOGY (SMARTCARD '99), 1999, : 63 - 74
  • [10] An integrated countermeasure against differential power analysis for secure smart-cards
    Corsonello, Pasquale
    Perri, Stefania
    Margala, Martin
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 5611 - 5614