International Journal of Information Security

, Volume 1, Issue 3, pp 189–202

Compliant cryptologic protocols

Authors

  • Ed Dawson
    • Information Security Research Centre, Queensland University of Technology, GPO Box 2434, Brisbane, Australia E-mail: {e.dawson,k.viswanathan,c.boyd}@qut.edu.au
  • Kapali Viswanathan
    • Information Security Research Centre, Queensland University of Technology, GPO Box 2434, Brisbane, Australia E-mail: {e.dawson,k.viswanathan,c.boyd}@qut.edu.au
  • Colin Boyd
    • Information Security Research Centre, Queensland University of Technology, GPO Box 2434, Brisbane, Australia E-mail: {e.dawson,k.viswanathan,c.boyd}@qut.edu.au
Regular contribution

DOI: 10.1007/s10207-002-0016-y

Cite this article as:
Dawson, E., Viswanathan, K. & Boyd, C. IJIS (2002) 1: 189. doi:10.1007/s10207-002-0016-y
  • 30 Views

Abstract.

Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities.

Download to read the full article text

Copyright information

© Springer-Verlag 2002