How to do things with cryptographic protocols

  • Authors:
  • Joshua D. Guttman

  • Affiliations:
  • The MITRE Corporation

  • Venue:
  • ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

When a distributed system may need to operate in the presence of an adversary, when it must support the activities of parties that do not trust one another fully, then cryptographic protocols will play a fundamental role in its design. One example of their importance is their ability to allow principals to agree on keys that will be shared for a session with an authenticated peer. But more fundamentally, a cryptographic protocol is a mechanism to achieve agreement among specific sets of peers, whether on keys or other values. Thus, they can play a fundamental role in organizing transactions in distributed systems, and coordinating interactions among principals.