2006
DOI: 10.1145/1127878.1127887
|View full text |Cite
|
Sign up to set email alerts
|

A consistent history authentication protocol

Abstract: Traditional strong authentication systems rely on a certification chain to delegate the authority of trusting an intermediate end.However, in some practical life scenarios a relayed authentication is not accepted and thus it would be advisable a straight proof of trustiness with a direct interaction with the involved party. Our protocol introduces a registry of certified operations from which it descends the authentication and the consequent proof of identity. Despite the fact that such system requires for reg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 12 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?