DocumentCode
564729
Title
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party
Author
Meadows, Catherine
Author_Institution
Naval Research Laboratory
fYear
1986
fDate
7-9 April 1986
Firstpage
134
Lastpage
134
Abstract
The problem of authentication of mutually suspicious parties is one that is becoming more and more important with the proliferation of distributed systems. In this paper we construct a protocol in which users can verify whether they have matching credentials without revealing their credentials to each other unless there is a match. Thk protocol requires a trusted third party, but does not require it to be available to the users except when they sign up for the system. Thus it is useful in situations in which a trusted third party exists, but is not available to all users at all times.
Keywords
Authentication; Cryptography; Generators; Helium; Organizations; Protocols; Zinc;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1986 IEEE Symposium on
Conference_Location
Oakland, CA, USA
ISSN
1540-7993
Print_ISBN
0-8186-0716-5
Type
conf
DOI
10.1109/SP.1986.10022
Filename
6234849
Link To Document