Capítulo de livro Revisado por pares

Authentication and delegation with smart-cards

1991; Springer Science+Business Media; Linguagem: Inglês

10.1007/3-540-54415-1_53

ISSN

1611-3349

Autores

M. Abadi, Michael T. Burrows, Charlie Kaufman, Butler Lampson,

Tópico(s)

Cryptography and Data Security

Resumo

The authentication of users in distributed systems poses special problems because users lack the ability to encrypt and decrypt. The same problems arise when users wish to delegate some of their authority to nodes, after mutual authentication. In most systems today, the user is forced to trust the node he wants to use. In a more satisfactory design, the user carries a smart-card with sufficient computing power to assist him; the card provides encryption and decryption capabilities for authentication and delegation. Authentication is relatively straightforward with a powerful enough smartcard. smart-card. However, for practical reasons, protocols that place few demands on smartcards smart-cards should be considered. These protocols are subtle, as they rely on fairly complex trust relations between the principals in the system (users, hosts, services). In this paper, we discuss a range of public-key smart-card protocols, and analyze their assumptions and the guarantees they offer.

Referência(s)