Skip to main content

Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control”

  • Conference paper
  • First Online:
Financial Cryptography (FC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1648))

Included in the following conference series:

Abstract

Business organizations are dynamic, thus they must have sufficient flexibility in expectation of future structural changes (change in personnel, policies, internal reorganizations, external restructuring, etc.). This issue is becoming increasingly important in recent years since nowadays firms operate in a more dynamic and flexible business environ- ment. As automation progresses, it is expected that cryptography will become a major control tool in organizations. Here we discuss what cryp- tography can provide to enable and manage this business environment of mutating organizations. The main thesis we put forth is the following: “Cryptographic designs traditionally concerned with mechanistic fault tolerance, in which faults are dynamic can, in turn, be the base for a ‘flexible design for control functions' in today's business environment.”

We show how combining various key management techniques which are robust against “dynamic faults” with proper semantically rich “enter- prise view management techniques” - provides a flexible enterprise cryp- tographic control. Such control can anticipate dynamic changes of the business entity. We demonstrate how to manage group entities which are either visible externally (using modified certification technology) as well as entities whose internal workings are hidden (using certification tech- nology and proactive protocol technology when extended to withstand failing and rejoining elements).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Blaze, J. Feigenbaum and J. Lacey, Decentralized Trust Management, IEEE Security and Privacy, 1996.

    Google Scholar 

  2. A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, ACM STOC 94, pp. 522–533.

    Google Scholar 

  3. Y. Desmedt and Y. Frankel, Shared Generation of Authenticators and Signatures Crypto 91, pp. 457–469.

    Google Scholar 

  4. L. Downes and C. Mui, unleashing the Killer App: digital strategies for market dominance, Harvard Business School Press, 1998.

    Google Scholar 

  5. C.M. Ellison, SPKI Certificate Document. 1998. (Document available also in URL http://ftp.clark.net/pub/cme/html/spki.html)

  6. B. Fox and B. LaMacchia, Certificate Revocation: Mechanisms and Meaning, Financial Cryptography 98, pp. 158–164.

    Google Scholar 

  7. Y. Frankel, A practical protocol for large group oriented networks, In J.J. Quisquater and J. Vandewalle, editor, Advances in Cryptology Proc. of Eurocrypt’ 89, pp. 56–61.

    Google Scholar 

  8. Y.Y. Frankel, P. Gemmel, P. MacKenzie and M. Yung Optimal Resilience Proactive Public Key Systems, FOCS 97.

    Google Scholar 

  9. Z. Galil, S. Haber and M. Yung, Cryptographic Computations: Secure Fault Tolerant Protocols in the Public Key Model, Crypto 87, pp. 135–155.

    Google Scholar 

  10. S. Haber and W.S. Stornetta, How to Time-Stamp a Digital Document, Journal of Cryptography, v. 3 n. 2, 1991, Springer International, pp. 99–112.

    Google Scholar 

  11. A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive Public-Key and Signature Schemes, ACM CCS 97.

    Google Scholar 

  12. R.J. Hayton, J.M. Bacon and K. Moody, Access Control in an Open Distributed Environment, IEEE Security and Privacy, 98, pp. 3–14.

    Google Scholar 

  13. B. Lampson, Protection, 5-th Princeton Symp. on Information Sciences 71, (Published 74 in ACM’s Operating Systems Review)

    Google Scholar 

  14. H. Lehti and P. Nikander, Certifying Trust, PKC 98, LNCS Springer 1431, pp. 83–98.

    Google Scholar 

  15. R. Ostrovsky and M. Yung, How to withstand mobile virus attacks, Proc. of the 10th ACM Symposium on the Principles of Distributed Computing, 1991, pp. 51–61.

    Google Scholar 

  16. R. Rivest and B. Lampson, SDSI-A simple distributed security infrastructure, (See also, http://theory.lcs.mit.edu/ cis/sdsi.html)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Frankel, Y., Yung, M. (1999). Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control”. In: Franklin, M. (eds) Financial Cryptography. FC 1999. Lecture Notes in Computer Science, vol 1648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48390-X_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-48390-X_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66362-1

  • Online ISBN: 978-3-540-48390-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics