Skip to main content

On the Security of Multi-Party Protocols in Distributed Systems

  • Conference paper
Advances in Cryptology
  • 703 Accesses

Abstract

Security of protocols for network communication has received considerable attention in recent years. We concentrate on ensuring the security of cryptographic protocols in distributed systems.

In a distributed system, beyond eavesdropping, a saboteur may impersonate another user or alter messages being sent. A saboteur who is also a user may send conflicting messages or use other illegal messages in order to uncover secret information.

The problem we address, in its most general form, is: “given a multi-party protocol which is provably secure when all the participants monitor every message being sent, can the protocol be modified to be secure in a distributed system?”

We use the Byzantine Agreement, Crusader Agreement, and other specific checks to improve protocols by making them secure in a general distributed network. We examine the trade-off between detection of faulty behaviour and the number of messages exchanged.

Part of this work has been done while the first author visited IBM Research Center, San Jose, California.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Dolev, “The Byzantine Generals Strike Again,” Journal of Algorithms, vol. 3, no. 1, pp. 14–30, 1982.

    Article  Google Scholar 

  2. D. Dolev, S. Even, and R. M. Karp, “On the Security of Ping-Pong Protocols,” CRYPT82, Santa Barbara, Aug. 1982.

    Google Scholar 

  3. W. Diffie, and M. Hellman, “New Direction in Cryptography,” IEEE Trans. on Information Theory, IT-22, 6, pp. 644–654, 1976.

    Article  Google Scholar 

  4. R. A. DeMillo, N. A. Lynch, and M. Merritt, “Cryptographic Protocols,” Proceedings of the 14th ACM SIGACT Symposium on Theory of Computing, May 1982.

    Google Scholar 

  5. D. Dolev, and R. Reischuk, “Bounds on Information Exchange for Byzantine Agreement,” Proceedings of the ACM SIGACT-SIGOPS Symposium on Principles of Distributed Systems, Aug. 1982.

    Google Scholar 

  6. D. Dolev, and H. R. Strong, “Polynomial Algorithms for Multiple Processor Agreement,” Proceedings of the 14th ACM SIGACT Symposium on Theory of Computing, May 1982.

    Google Scholar 

  7. D. Dolev, A. C. Yao, “On the Security of Public Key Protocols,” to appear, IEEE Trans. on Information Theory.

    Google Scholar 

  8. M. J. Fischer, N. A. Lynch, and M. S. Paterson, “Impossibility of Distributed Consensus with One Faulty Process,” unpublished manuscript, Aug. 1982.

    Google Scholar 

  9. L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem,” ACM Trans. on Programming Languages and Systems, to appear.

    Google Scholar 

  10. R. J. Lipton, and A. Wigderson, “Multi-Party Cryptographic Protocols,” unpublished manuscript, May 1962.

    Google Scholar 

  11. R. M. Needham, and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers,“ CACM, vol. 21, no. 12, pp. 993–999, 1978.

    Google Scholar 

  12. Presence of Faults,“ JACM, vol. 27, no. 2, pp. 228–234, 1980.

    Google Scholar 

  13. R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signa- tures and public-key cryptosystems,” CACM, vol. 21, pp. 120–126, 1978.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1983 Springer Science+Business Media New York

About this paper

Cite this paper

Dolev, D., Wigderson, A. (1983). On the Security of Multi-Party Protocols in Distributed Systems. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0602-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-0602-4_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4757-0604-8

  • Online ISBN: 978-1-4757-0602-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics