Specification of Dependable Trusted Third Parties
نویسندگان
چکیده
This document describes an architecture for secure service replication in an asynchronous network like the Internet, where a malicious adversary may corrupt some servers and control the network. The underlying protocols for Byzantine agreement and for atomic broadcast rely on recent developments in threshold cryptography. These assumptions are discussed in detail and compared to related work from the last decade. A formal model using concepts from modern cryptography is developed, modular definitions for several broadcast problems are presented, including reliable, atomic, and secure causal broadcast, and protocols implementing them. Reliable broadcast is a basic primitive, also known as the Byzantine generals problem, providing agreement on a delivered message. Atomic broadcast imposes additionally a total order on all delivered messages. A randomized asynchronous atomic broadcast protocol is presented that maintains liveness and safety at the same time. It is based on a new efficient protocol for multi-valued asynchronous Byzantine agreement with an external validity condition. Secure causal broadcast extends atomic broadcast by encryption to guarantee a causal order among the delivered messages. Furthermore, it is discussed how several distributed trusted applications can be realized using such an architecture: a digital notary service, a trusted third party for fair exchange, a certification authority, and an authentication service.
منابع مشابه
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user and remote third parties. The privacy implications of this approach are investigated in the context of the Trusted Computing Platform Alliance (TCPA) specification. The trust relationships of the TCPA architecture are e...
متن کاملTrusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and software) built into nodes with Trusted Computing capabilities. These trusted third parties may be used for supporting communications in distributed systems. In particular, a trusted third party can check and certify the dat...
متن کاملControlling Access in Databases by Outsourcing Access Control to Trusted Third Parties
There are situations where users of databases cannot fully trust the administrators of databases where they store their data. In this paper we describe an outsourced access control model for such database. In this model, access control to databases is outsourced to trusted third parties. The tasks of the trusted third parties are: mediate access control to databases and store and manage policie...
متن کاملA Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party
The fairness of data exchange becomes a key factor for the transaction over the Internet. To ensure the fairness of data exchange, the protocol needs a trusted third party be a judge when the dispute occurs, and has to give a guarantee to main parties during the data exchange. To eliminate the third party’s connectional time and enhance its security, a fair-exchange protocol based on off-line s...
متن کاملBehavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol
We present a solution for identification and reduction of malicious conduct by Trusted Third parties (TTPs) in Secure Multiparty Computing Protocol. This paper also proposes a secured protocol for computation and defines encryption to be performed before sending inputs for computation. Our protocol uses eenvelopes for sharing keys between parties and TTPs. This key sharing is done on the basis ...
متن کامل