Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.5.105

Responsibility and Credit: New Members of the Authentication Family?  

Park, Dong-Gook (Sunchon National University)
Abstract
There are several goals or properties which authentication protocols may have; some of them are key freshness, far-end aliveness, key confirmation, etc. Most of them have extensively been discussed and studied so far in the literature. 'Responsibility' and 'credit', which were first raised by Abadi as additional goals, received quite an exceptional treatment; there were little response from researchers about these new goals. It is surprising to see that these two properties have slipped through any investigation, successfully achieving the positions as the goals for authentication protocols. In this paper, we investigate these two new properties and their relations to authentication protocols, and answers to the question: what brings us credit and responsibility.
Keywords
credit; responsibility authentication protocols; key;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Park, Cryptographic Protocols for Third Generation Mobile Communication Systems, PhD thesis, Queensland University of Technology, 2000
2 R. Gorrieri, F. Martinelli, and M. Petrocchi, 'A Formalization of Credit and Responsibility', Proceedings of SASYFT 2004. Available from http://www.iit.cnr.it/ staff/fabio.martinelli/
3 A. Durante, R. Focardi, and R. Gorrieri, 'CVS at Work: A Report on New Failures upon Some Cryptographic Protocols', Proceedings of MMA-ACNS'01, Springer LNCS 2502, May 2001
4 A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997
5 M. Abadi, 'Two facets of authentication', Proceedings of 11th IEEE CSFW, pp. 27-33, 1998
6 M. Abadi, 'Security Protocols and their Properties', Foundations of Secure Computation, NATO Science Series, IOS Press, Volume for the 20th International Summer School on Foundations of Secure Computation, pp. 39-60, 2000
7 M. Burrows, M. Abadi, and R. Needham, 'A logic of authentication', DEC Systems Research Center, Report 39, revised February 22, 1990
8 C. Boyd, 'Towards extensional goals in authentication protocols', DIMACS Workshop on Cryptographic Protocol Design and Verification, 1997