Secure end-to-end delegations in distributed systems

  • Authors:
  • Thomas Hardjono;Tadashi Ohta

  • Affiliations:
  • -;Communication Systems Research Laboratories, ATR International, 2-2 Hikaridai, Seika-cho, Soraku-gun, Kyoto 619-02, Japan

  • Venue:
  • Computer Communications
  • Year:
  • 1994

Quantified Score

Hi-index 0.24

Visualization

Abstract

Delegation of tasks represents an important aspect of a distributed system, which sustains the availability of services offered by such a system. A necessary requirement of delegations is that they be performed in a secure and manner. This paper presents a delegation scheme based on an adapted ZS-3 public key cryptosystem^2^4. The scheme allows an originator of the delegation to specify the executor of the delegated task and the intermediaries that participate in the event. It also features the ability of the executor to verify that all participating intermediaries remain uncompromised. The scheme attains a level of security against internal and external attacks, which is equivalent to the solving of instances of the discrete logarithm problem, thus making it an attractive candidate for delegations in distributed systems from the point of view of security.