On the Security of Multi-Party Protocols in Distributed Systems
Security of protocols for network communication has received considerable attention in recent years. We concentrate on ensuring the security of cryptographic protocols in distributed systems.
In a distributed system, beyond eavesdropping, a saboteur may impersonate another user or alter messages being sent. A saboteur who is also a user may send conflicting messages or use other illegal messages in order to uncover secret information.
The problem we address, in its most general form, is: “given a multi-party protocol which is provably secure when all the participants monitor every message being sent, can the protocol be modified to be secure in a distributed system?”
We use the Byzantine Agreement, Crusader Agreement, and other specific checks to improve protocols by making them secure in a general distributed network. We examine the trade-off between detection of faulty behaviour and the number of messages exchanged.
KeywordsPrivate Information Signature Scheme Secret Information Signed Message Cryptographic Protocol
Unable to display preview. Download preview PDF.
- (DEK).D. Dolev, S. Even, and R. M. Karp, “On the Security of Ping-Pong Protocols,” CRYPT82, Santa Barbara, Aug. 1982.Google Scholar
- (DLM).R. A. DeMillo, N. A. Lynch, and M. Merritt, “Cryptographic Protocols,” Proceedings of the 14th ACM SIGACT Symposium on Theory of Computing, May 1982.Google Scholar
- (DR).D. Dolev, and R. Reischuk, “Bounds on Information Exchange for Byzantine Agreement,” Proceedings of the ACM SIGACT-SIGOPS Symposium on Principles of Distributed Systems, Aug. 1982.Google Scholar
- (DS).D. Dolev, and H. R. Strong, “Polynomial Algorithms for Multiple Processor Agreement,” Proceedings of the 14th ACM SIGACT Symposium on Theory of Computing, May 1982.Google Scholar
- (DY).D. Dolev, A. C. Yao, “On the Security of Public Key Protocols,” to appear, IEEE Trans. on Information Theory.Google Scholar
- (FLP).M. J. Fischer, N. A. Lynch, and M. S. Paterson, “Impossibility of Distributed Consensus with One Faulty Process,” unpublished manuscript, Aug. 1982.Google Scholar
- (LSP).L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem,” ACM Trans. on Programming Languages and Systems, to appear.Google Scholar
- (LW).R. J. Lipton, and A. Wigderson, “Multi-Party Cryptographic Protocols,” unpublished manuscript, May 1962.Google Scholar
- (NS).R. M. Needham, and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers,“ CACM, vol. 21, no. 12, pp. 993–999, 1978.Google Scholar
- (PSL).Presence of Faults,“ JACM, vol. 27, no. 2, pp. 228–234, 1980.Google Scholar