cient Failure Discovery with Limited Authentication
نویسنده
چکیده
Solutions for agreement problems in distributed sys tems can generally be divided into two classes authen ticated protocols and non authenticated protocols Au thenticated protocols make use of authenticated mes sages i e the messages can be signed in a way that a signed message can be assigned unambiguously to the signer Few has been said about how to achieve this kind of authentication in some settings this is im possible without a trusted dealer or other mechanisms outside the system In this paper we introduce and investigate a weaker kind of authentication local authentication It can be achieved within a distributed system with an arbi trary number of arbitrary faults We then show that Failure Discovery a problem introduced by Hadzilacos and Halpern can be solved with authenticated protocols even if only local authentication is available Since au thenticated protocols for this problem have linear mes sage complexity as opposed to quadratic complexity in the non authenticated case the e ort of establish ing local authentication once results in a substantial reduction of messages in subsequent failure discovery protocols
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Robust and E cient SIP Authentication Scheme
The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be e cient. This paper proposes a robust and e cient three-party S...
متن کاملAge Detection Through Keystroke Dynamics from User Authentication Failures
In this paper an incident response approach is proposed for handling detections of authentication failures in systems that employ dynamic biometric authentication and more specifically keystroke user recognition. The main component of the approach is a multi layer perceptron focusing on the age classification of a user. Empirical findings show that the classifier can detect the age of the subje...
متن کاملEntity Authentication and Key Distribution
Entity authentication and key distribution are central cryptographic problems in distributed computing|but up until now, they have lacked even a meaningful de nition. One consequence is that incorrect and ine cient protocols have proliferated. This paper provides the rst treatment of these problems in the complexity-theoretic framework of modern cryptography. Addressed in detail are two problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009