2000
DOI: 10.1016/s0140-3664(00)00250-4
|View full text |Cite
|
Sign up to set email alerts
|

On the construction of a powerful distributed authentication server without additional key management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…An important benefit of this authentication model is that it requires no key management since the processing nodes do not handle secret data. There are many issues with achieving consistency of replicated private keys as well as achieving their secure distribution [10]. The model in [8] reduces secure server load compared to systems that run asymmetric crypto algorithms on a single server.…”
Section: Review Of Distributed Authentication Protocolsmentioning
confidence: 99%
“…An important benefit of this authentication model is that it requires no key management since the processing nodes do not handle secret data. There are many issues with achieving consistency of replicated private keys as well as achieving their secure distribution [10]. The model in [8] reduces secure server load compared to systems that run asymmetric crypto algorithms on a single server.…”
Section: Review Of Distributed Authentication Protocolsmentioning
confidence: 99%