Efficient and trustworthy key distribution in webs of trust

被引:5
作者
Borcherding, B
Borcherding, M
机构
[1] Univ Karlsruhe, European Inst Syst Secur, D-76128 Karlsruhe, Germany
[2] BROKAT Systeme GmbH, D-70565 Stuttgart, Germany
关键词
authentication; key distribution; key management; trust;
D O I
10.1016/S0167-4048(98)00001-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a method for finding trust paths in webs of trust. It makes use of untrusted key servers which collect certain information about trust relationships and give hints as to where a trustworthy recommendation path can be found. These hints can then be verified in a distributed protocol amongst the affected entities. In global networks, reliable distribution of public keys for authentication and encryption purposes is still a problem. Since it is impossible to have a single, globally trusted key server, a distributed approach is necessary. If an entity A looks for a public key of a prospective communication partner B, it will first ask its local trusted servers. If these servers do not know the public key of B, they can recommend other entities as trustworthy servers to A. With this method, A can go along a whole recommendation path until it finds the key of B. In order to believe that the key is indeed correct, A has to trust all entities on the path. The problem that remains is to find the right direction for a trustworthy recommendation path. There are two main approaches: The first is a strict regulation of the trust relationships, such that the search can go along a hierarchy. This implies that the participants have no choice but to follow the given trust structure. The second approach is an unrestricted web of trust. In these systems, there is not yet a satisfactory way to find trust paths. (C) 1998 Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:447 / 454
页数:8
相关论文
共 12 条
[1]  
[Anonymous], LNCS
[2]  
BEHT T, 1991, P IMA WORKSH CRYPT C
[3]  
Birrell A. D., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P223
[4]  
BORCHERDING B, 1995, P IFIP TC6 TC11 AUST, P24
[5]  
BORCHERDING M, 1993, THESIS U KARLSRUHE
[6]  
GLIGOR VD, 1992, P IEEE C SEC PRIV, P2
[7]  
LAMPSON B, 1991, 13 ACM S OP SYST PRI, P165
[8]  
Manber U., 1989, INTRO ALGORITHMS CRE
[9]  
Simson Garfinkel, 1995, PGP PRETTY GOOD PRIV
[10]  
Yahalom R., 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.93CH3290-4), P150, DOI 10.1109/RISP.1993.287635