Abstract
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to do so. This requires keys to be bound to principals in an unforgetably verifiable manner.
Cryptographic bit patterns such as electronic key certificates (EKCs) have a part to play in establishing such bindings, but the requirement ultimately to bind keys to real world entities imposes subtle constraints upon the structure and semantics of EKCs and related entities such as ACLs and capabilities, and upon the role which such entities may play in access control and integrity verification. These do not appear to be adequately realized at present.
Preview
Unable to display preview. Download preview PDF.
References
Ellison, C.M., 1996, Establishing Identity without Certification Authorities, Sixth USENIX Security Symposium Proceedings 67-76
Ellison, C.M., Frantz, B. and Thomas, B.M., 1996, Simple Public Key Certificate, http://www.clark.net/pub/cme/
Harbison, W.S., 1997, Trusting in Computer Systems, PhD thesis, Computer Laboratory, University of Cambridge
Lek, H. van der, Bakema, G.P. and Zwart, J.P.C., 1992, De Unificatie van Object-typen en Feittypen een Pracktisch en Diadactisch Vruchtbare Theorie (Unifying Object Types and Fact Types: A Practically and Didactically Productive Theory), Informatie 34(5) 279–295
Low, M.R. and Christianson, B., 1994, Self Authenticating Proxies, The Computer Journal 37(5) 422–428
Needham, R., 1997, The changing Environment for Security Protocols, IEEE Network 11(3) 12–15
Rivest, R.L. and Lampson, B., 1996, SDSI-A Simple Distributed Security Infrastructure, http://theory.Ics.mit.edu/~rivest/
Snook, J.F., 1992, Towards Secure Optimistic Distributed Open Systems, PhD thesis, University of Hertfordshire: Hatfield
Roe, M., 1997, Cryptography and Evidence, PhD thesis, Computer Laboratory, University of Cambridge
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Christianson, B., Malcolm, J.A. (1998). Binding bit patterns to real world entities. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds) Security Protocols. Security Protocols 1997. Lecture Notes in Computer Science, vol 1361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028163
Download citation
DOI: https://doi.org/10.1007/BFb0028163
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64040-0
Online ISBN: 978-3-540-69688-9
eBook Packages: Springer Book Archive