Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Authentication metric analysis and design
Reiter M., Stubblebine S. ACM Transactions on Information and System Security2 (2):138-158,1999.Type:Article
Date Reviewed: Nov 1 1999

This paper addresses the issue of determining the owner of a public key or, on the other hand, determining a user’s public key in order to encrypt data for secure transmission. In most real-life situations that involve different administrative domains, there is no single authority for providing this information. Many systems use paths (or chains) of authorities. If any authority incorrectly authenticates the next authority in the path, the user is in trouble.

There are several proposed metrics for measuring the assurance of a set of paths. The authors discuss the strengths and weaknesses of four: their own current one, Maurer, Zimmermann, and Beth-Borcherding-Klein. They then develop eight design principles upon which any assurance metric should be based. None of the four metrics conforms to all eight principles. Finally, they propose a new metric based on insurance (surety bonding), which conforms to all these principles. Each path has a value representing the amount of money the authority for that path is willing to pay the user if the name-to-key binding is incorrect.

This technical paper is highly readable and provides a starting point for designing new assurance metrics for multiple-path public key authentication.

Reviewer:  Anthony Donald Vanker Review #: CR122590 (9911-0846)
Bookmark and Share
 
Authentication (D.4.6 ... )
 
 
Authentication (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed)  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)2641990. Type: Proceedings
Jan 1 1992
Some constructions and bounds for authentication codes
Stinson D.  Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987)4251987. Type: Proceedings
Sep 1 1988
A pauper’s callback scheme
Bishop M. Computers and Security 5(2): 141-144, 1986. Type: Article
Mar 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy