Skip to main content

Trusted Third Party

  • Reference work entry
  • 106 Accesses

A Trusted Third Party (TTP), sometimes referred to as a Trusted Authority, is an entity within a given community that is trusted by all entities in that community to properly perform a particular service. In some architectures, the TTP must store and adequately protect long-term secrets. The compromise of such secrets will immediately render insecure all future communications in the network and may also render insecure all past communications protected by using those secrets; this situation will persist until new long-term secrets can be established. In some architectures the TTP may have the ability to read all messages. Typically, the service performed by the TTP will enhance the security of other messages or transactions between entities in the community; example services include key generation, entity authentication, time stamping, and notarization.

Examples of TTPs in well-known architectures include the Key Distribution Center (KDC) in Kerberos, the Certification Authority(CA)...

This is a preview of subscription content, log in via an institution.

References

  1. Menezes, A., P. van Oorschot, and S. Vanstone (1997). Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.

    MATH  Google Scholar 

  2. Stinson, D. (1995). Cryptography: Theory and Practice. CRC Press, Boca Raton, FL.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Adams, C. (2005). Trusted Third Party. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_441

Download citation

Publish with us

Policies and ethics