Abstract
Public key certification, network security and electronic commerce are all tightly bound to the concept of “trust”. Nearly every paper deals with the word. Yet, few if any define it and none really defines it in a way useful to cryptographic engineers. Some uses of the word act like a verbal shell game, confusing the reader. These might be intentional or innocent: a product of trying too hard to convince the reader or just careless use of a word thought understood by all. As an alternative, this paper proposes a more concrete approach to the body of issues falling under the label of “trust” — one meaningful to cryptographic, security and computer engineers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, Burrows, Lampson and Plotkin, ”A Calculus for Access Control in Distributed Systems”, DEC SRC-070, revised August 28, 1991.
Denning, Dorothy E., “Response to the NRC report”, June 1996, http://guru.cosc.georgetown.edu/~denning/crypto/NRC.txt
Diffie and Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, November 1976, pp. 644–654
Ellison, Carl M., “Establishing Identity Without Certification Authorities”, 6th USENIX Security Symposium, July 1996, http://www.clark.net/pub/cme/usenix.html
Ellison, Carl M., “Emergency Key Recovery Without Third Parties”, http://www.clark.net/pub/cme/html.html
Kaner, Cem, “The Insecurity of the Digital Signature”, September, 1997, http://www.badsoftware.com/digsig.htm
Kohnfelder, Loren M., “Towards a Practical Public-key Cryptosystem”, May 1978.
McConnell and Appel, “Enabling Privacy, Commerce, Security and Public Safety in the Global Information Infrastructure”, report of the Interagency Working Group on Cryptography Policy, May 12, 1996; [quote from paragraph 5 of the Introduction]
SPKI documents: http://www.clark.net/pub/cme/html/spki.html
Winn, Jane K., Couriers Without Luggage: Negotiable Instruments and Digital Signatures, 49 S.C. L. Rev. (forthcoming May 1998).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ellison, C. (1998). The Trust Shell Game. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_5
Download citation
DOI: https://doi.org/10.1007/3-540-49135-X_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65663-0
Online ISBN: 978-3-540-49135-4
eBook Packages: Springer Book Archive