Abstract
Security of protocols for network communication has received considerable attention in recent years. We concentrate on ensuring the security of cryptographic protocols in distributed systems.
In a distributed system, beyond eavesdropping, a saboteur may impersonate another user or alter messages being sent. A saboteur who is also a user may send conflicting messages or use other illegal messages in order to uncover secret information.
The problem we address, in its most general form, is: “given a multi-party protocol which is provably secure when all the participants monitor every message being sent, can the protocol be modified to be secure in a distributed system?”
We use the Byzantine Agreement, Crusader Agreement, and other specific checks to improve protocols by making them secure in a general distributed network. We examine the trade-off between detection of faulty behaviour and the number of messages exchanged.
Part of this work has been done while the first author visited IBM Research Center, San Jose, California.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Dolev, “The Byzantine Generals Strike Again,” Journal of Algorithms, vol. 3, no. 1, pp. 14–30, 1982.
D. Dolev, S. Even, and R. M. Karp, “On the Security of Ping-Pong Protocols,” CRYPT82, Santa Barbara, Aug. 1982.
W. Diffie, and M. Hellman, “New Direction in Cryptography,” IEEE Trans. on Information Theory, IT-22, 6, pp. 644–654, 1976.
R. A. DeMillo, N. A. Lynch, and M. Merritt, “Cryptographic Protocols,” Proceedings of the 14th ACM SIGACT Symposium on Theory of Computing, May 1982.
D. Dolev, and R. Reischuk, “Bounds on Information Exchange for Byzantine Agreement,” Proceedings of the ACM SIGACT-SIGOPS Symposium on Principles of Distributed Systems, Aug. 1982.
D. Dolev, and H. R. Strong, “Polynomial Algorithms for Multiple Processor Agreement,” Proceedings of the 14th ACM SIGACT Symposium on Theory of Computing, May 1982.
D. Dolev, A. C. Yao, “On the Security of Public Key Protocols,” to appear, IEEE Trans. on Information Theory.
M. J. Fischer, N. A. Lynch, and M. S. Paterson, “Impossibility of Distributed Consensus with One Faulty Process,” unpublished manuscript, Aug. 1982.
L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem,” ACM Trans. on Programming Languages and Systems, to appear.
R. J. Lipton, and A. Wigderson, “Multi-Party Cryptographic Protocols,” unpublished manuscript, May 1962.
R. M. Needham, and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers,“ CACM, vol. 21, no. 12, pp. 993–999, 1978.
Presence of Faults,“ JACM, vol. 27, no. 2, pp. 228–234, 1980.
R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signa- tures and public-key cryptosystems,” CACM, vol. 21, pp. 120–126, 1978.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1983 Springer Science+Business Media New York
About this paper
Cite this paper
Dolev, D., Wigderson, A. (1983). On the Security of Multi-Party Protocols in Distributed Systems. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0602-4_15
Download citation
DOI: https://doi.org/10.1007/978-1-4757-0602-4_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-0604-8
Online ISBN: 978-1-4757-0602-4
eBook Packages: Springer Book Archive