Maintaining authenticated communication in the presence of break-ins

被引:20
作者
Canetti, R
Halevi, S
Herzberg, A
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[3] IBM Haifa Res Lab Tel Aviv, Weizmann Inst, Tel Aviv, Israel
关键词
authentication protocols; break-ins; recovery; distributed signatures; proactive signatures; proactive protocols;
D O I
10.1007/s001459910004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of maintaining authenticated communication over untrusted communication channels, in a scenario where the communicating parties may be occasionally and repeatedly broken into for transient periods of time. Once a party is broken into, its cryptographic keys are exposed and perhaps modified. Yet, when aided by other parties it should be able to regain its ability to communicate in an authenticated way. We present a mathematical model for this highly adversarial setting, exhibiting salient properties and parameters, and then describe a practically appealing protocol for solving this problem. A key element in our solution is devising a proactive distributed signature (PDS) scheme in our model. The PDS schemes known in the literature are designed for a model where authenticated communication is available. We therefore show how these schemes can be modified to work in our model, where no such primitives are available a priori. In the process of devising these schemes, we also present a new definition of PDS schemes (and of distributed signature schemes in general). This definition may be of independent interest.
引用
收藏
页码:61 / 105
页数:45
相关论文
共 34 条
[1]  
[Anonymous], 1982, 23 ANN S FDN COMPUTE, DOI DOI 10.1109/SFCS.1982.45
[2]  
[Anonymous], 1998, P 30 ANN ACM S THEOR
[3]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P377
[4]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[5]   HOW TO SIGN GIVEN ANY TRAPDOOR PERMUTATION [J].
BELLARE, M ;
MICALI, S .
JOURNAL OF THE ACM, 1992, 39 (01) :214-233
[6]  
BELLARE M, 1993, LECT NOTES COMPUTER, V733, P232
[7]  
Ben-Or Michael, 1988, P 20 ANN ACM S THEOR, P1, DOI DOI 10.1145/62212.62213
[8]   SYSTEMATIC DESIGN OF A FAMILY OF ATTACK-RESISTANT AUTHENTICATION PROTOCOLS [J].
BIRD, R ;
GOPAL, I ;
HERZBERG, A ;
JANSON, PA ;
KUTTEN, S ;
MOLVA, R ;
YUNG, M .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) :679-693
[9]  
Blake-Wilson S., 1997, P 6 IMA INT C CRYPT
[10]  
BLAKEWILSON S, 1997, P 1997 SEC PROT WORK