International Journal of Information Security

, Volume 1, Issue 3, pp 189–202

Compliant cryptologic protocols

  • Ed Dawson
  • Kapali Viswanathan
  • Colin Boyd
Regular contribution

DOI: 10.1007/s10207-002-0016-y

Cite this article as:
Dawson, E., Viswanathan, K. & Boyd, C. IJIS (2002) 1: 189. doi:10.1007/s10207-002-0016-y
  • 33 Downloads

Abstract.

Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities.

Copyright information

© Springer-Verlag 2002

Authors and Affiliations

  • Ed Dawson
    • 1
  • Kapali Viswanathan
    • 1
  • Colin Boyd
    • 1
  1. 1.Information Security Research Centre, Queensland University of Technology, GPO Box 2434, Brisbane, Australia E-mail: {e.dawson,k.viswanathan,c.boyd}@qut.edu.auAU