Abstract
A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and hardware keys. Each user is responsible for his own security and need not rely on the security of the central facility or the communication links. A user can safely store confidential files in the central facility or transmit confidential data to other users on the network.
- 1 Diffie, W., and Hellman, M.E. New directions in cryptography. 1EEE Trans. Inform. Theory IT-22, 6 (Nov. 1976), 644-654.]]Google ScholarDigital Library
- 2 Flynn, R., and Campasano, A.S. Data dependent keys for a selective encryption terminal. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1127-1129.]]Google Scholar
- 3 Hellman, M.E. Security in communication networks. Proc. AFIPS 1978 NCC, Vol. 47, AFIPS Press, Montvale, N.J., pp. 1131- 1134.]]Google Scholar
- 4 Konfelder, L.M. A method for certification. Tech. Rep., Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., May 1978.]]Google Scholar
- 5 Konheim, A.G. Cryptographic methods for data protection. Res. Rep. RC 7026 (#30100), IBM Thomas J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1978.]]Google Scholar
- 6 Lampson, B.W. A note on the confinement problem. Comm. ACM 16, 10 (Oct. 1973), 613-615.]] Google ScholarDigital Library
- 7 Lempel, A. Cryptography in transition. Comptg. Surveys (to appear).]]Google Scholar
- 8 Merkle, R.C. Secure communication over an insecure eliannel. Comm. ACM 21, 4 (April 1978), 294-299.]] Google ScholarDigital Library
- 9 Merkle, R.C., and Hellman, M.E. Hiding information and signatures in trap door knapsacks. IEEE Trans. Inform. Theory IT-24, 5 (Sept. 1978), 525-530.]]Google ScholarCross Ref
- 10 Montgomery, W.A. Measurements of sharing in MULTICS. Proc. 6th Symp. on Operating Syst. Principles, Spec. issue, Operating Syst. Rev. (ACM) 11, 5, Nov. 1977, pp. 85-90.]] Google ScholarDigital Library
- 11 National Bureau of Standards. Data Encryption Standard. FIPS PUB 46, Washington, D.C., Jan. 1977.]]Google Scholar
- 12 Needham, R., and Schroeder, M. Security and authentication in large networks of computers. Comm. ACM 21, 12 (Dec. 1978), 993- 999.]] Google ScholarDigital Library
- 13 Popek, G.J., and Kline, C.S. Design issues for secure computer networks. In Operating Systems, an Advanced Course, R. Bayer, R.M. Graham, and G. SeegmuUer, Eds., Springer-Verlag, New York, 1978.]] Google ScholarDigital Library
- 14 Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1978), 120-126.]] Google ScholarDigital Library
- 15 Rivest, R.L., Adleman, L., and Dertouzos, M.L. On data banks and privacy homomorphisms. In Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R.L. Lipton, Eds., Academic Press, New York, 1978.]] Google ScholarDigital Library
- 16 Saltzer, J. On digital signatures. Operating Syst. Rev. 12, 2 (April 1978), 12-14.]] Google ScholarDigital Library
- 17 Simmons, G.J. Computational complexity and secure communications. Comptg. Surveys (to appear).]]Google Scholar
- 18 Tanenbaum, A. A distributed interactive computing system. IR-20, Vrije Universiteit, The Netherlands, June 1977.]]Google Scholar
Index Terms
- Secure personal computing in an insecure network
Recommendations
Secure public-key encryption scheme without random oracles
Since the first practical and secure public-key encryption scheme without random oracles proposed by Cramer and Shoup in 1998, Cramer-Shoup's scheme and its variants remained the only practical and secure public-key encryption scheme without random ...
Public-key encryption with keyword search secure against continual memory attacks
Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public-...
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OAEP cannot be proven secure from the one-wayness of the underlying trapdoor ...
Comments