A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A new signature scheme based on the DSA giving message recovery
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Security functions for a file repository
ACM SIGOPS Operating Systems Review
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Fast Software Implementation for Arithmetic Operations in GF(2n)
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
User Controlled Sharing in a Variable Connected Distributed System
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Secret Key Authentication with Software-Only Verification
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
The Open-End Argument for Private Computing
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
Hi-index | 0.00 |
This article describes mechanisms for offline delegation of access rights to files maintained by a distributed "File Repository". The mechanisms are designed for a target environment where personal machines are used at times when critical services, such as authentication and authorization services, are not accessible. We demonstrate how valid delegation credentials can be transferred verbally without the use of shared secrets. Our main result shows that delegation of access rights can be accomplished in a system that uses public-key encryption for secrecy and integrity, without forcing the user to rely on a trusted third party, and without requiring connection to the infrastructure. The implementation runs on a contemporary Personal Digital Assistant (PDA); the performance is satisfactory.