An intrusion-tolerant authorization and authentication scheme in distributed environments

  • Authors:
  • Guo Yuan-bo;Ma Jian-feng

  • Affiliations:
  • Xidian University, Xi'an, Shaanxi, China;Xidian University, Xi'an, Shaanxi, China

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we introduce an intrusion-tolerant authorization and authentication scheme in distributed environments, by the utilization of a secure multi-party computation scheme by virtue of Feldman's (t + 1, n) VSS to perform the warrant authorization. In this way, a warrant can be obtained in a distributed fashion in which any k of registration severs are required to perform the computation. The n segments of the private key of the registration severs set---which are spread across n registration severs---do not have to be recombined on a single machine to perform a warrant authorization. Since k , the requirement that only k segments are needed inherently provides system reliability.