A pragmatic alternative to undetectable signatures

Chris J. Mitchell, Borselius, N. and Wilson, A.

(2002)

Chris J. Mitchell, Borselius, N. and Wilson, A. (2002) A pragmatic alternative to undetectable signatures. ACM SIGOPS Operating Systems Review, 36 (2).

Our Full Text Deposits

Full text access: Open

Full Text - 102.93 KB

Full Text - 105.05 KB

Links to Copies of this Item Held Elsewhere


Abstract

A 'pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were introduced by Sander and Tschudin, [4], as a means of giving a mobile agent the means to sign a message on behalf of a user, without endangering the user's private key. The alternative discussed in this paper involves the use of conventional signatures and public key certificates.

Information about this Version

This is a Published version
This version's date is: 04/2002
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/b91825d1-2d4c-8507-77c0-fe0c08b22243/1/

Item TypeJournal Article
TitleA pragmatic alternative to undetectable signatures
AuthorsMitchell, Chris
Borselius, N.
Wilson, A.
Uncontrolled Keywordscrytopgraphy, distributed systems
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1145/509526.509529

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

This is the final draft version of the paper that appeared in 'ACM SIGOPS Operating Systems Review', 36(2), 2002.

References

1 Bruno Crispo, Delegation of Responsibility (Position Paper), Proceedings of the 6th International Workshop on Security Protocols, p.118-124, April 15-17, 1998
2 B. Crispo and B. Christianson. A note about the semantics of delegation. Preprint, 1999.
3 Panayiotis Kotzanikolaou , Mike Burmester , Vassilios Chrissikopoulos, Secure Transactions with Mobile Agents in Hostile Environments, Proceedings of the 5th Australasian Conference on Information Security and Privacy, p.289-297, July 10-12, 2000
4 Tomas Sander , Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts, Mobile Agents and Security, p.44-60, January 1998
5 V. Varadharajan, P. Allen, and S. Black. An analysis of the proxy problem in distributed systems. In Proceedings: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 255-275. IEEE Computer Society Press, Los Alamitos, California, May 1991.


Details