Verification of Treaty Compliance -- Revisited

  • Authors:
  • Gustavus J. Simmons

  • Affiliations:
  • -

  • Venue:
  • SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
  • Year:
  • 1983

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a series of papers, the author has documentedthe evolution at the Sandia National Laboratoriesof a solution to the problem of how two mutuallydeceitful and distrusting parties -- the hostand the monitor -- can both trust a data acquisitionsystem whose function is to inform the monitor,and perhaps third parties, whether the hosthas or has not violated the terms of a treaty. Thenational interests of the various participants,host, monitor and third parties, at first appear tobe mutually irreconcilable, however the conclusionof this paper will be that it is possible to simultaneouslysatisfy the interests of all parties. Thetechnical device on which this fourth, and hopefullyfinal, iteration of treaty verification systemsis based is the concatenation of two or moretwo key cryptographic systems. In the resultingsystem no part of the rneasage need be kept secretfrom any participant at anytime; no party, nor collusionof fewer than all of the parties can utteran undetectable forgery;no unilateral action onthe part of any party can lessen the confidence ofthe others as to the authenticity of the data andfinally third parties can be logically persuadedof the authenticity of messages. Thus, finallyafter a decade of development a complete technicalsolution is in hand for the problem of the verificationof treaty compliance.