Skip to main content

The Trust Shell Game

Position Paper

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1550))

Included in the following conference series:

Abstract

Public key certification, network security and electronic commerce are all tightly bound to the concept of “trust”. Nearly every paper deals with the word. Yet, few if any define it and none really defines it in a way useful to cryptographic engineers. Some uses of the word act like a verbal shell game, confusing the reader. These might be intentional or innocent: a product of trying too hard to convince the reader or just careless use of a word thought understood by all. As an alternative, this paper proposes a more concrete approach to the body of issues falling under the label of “trust” — one meaningful to cryptographic, security and computer engineers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, Burrows, Lampson and Plotkin, ”A Calculus for Access Control in Distributed Systems”, DEC SRC-070, revised August 28, 1991.

    Google Scholar 

  2. Denning, Dorothy E., “Response to the NRC report”, June 1996, http://guru.cosc.georgetown.edu/~denning/crypto/NRC.txt

  3. Diffie and Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, November 1976, pp. 644–654

    Google Scholar 

  4. Ellison, Carl M., “Establishing Identity Without Certification Authorities”, 6th USENIX Security Symposium, July 1996, http://www.clark.net/pub/cme/usenix.html

  5. Ellison, Carl M., “Emergency Key Recovery Without Third Parties”, http://www.clark.net/pub/cme/html.html

  6. Kaner, Cem, “The Insecurity of the Digital Signature”, September, 1997, http://www.badsoftware.com/digsig.htm

  7. Kohnfelder, Loren M., “Towards a Practical Public-key Cryptosystem”, May 1978.

    Google Scholar 

  8. McConnell and Appel, “Enabling Privacy, Commerce, Security and Public Safety in the Global Information Infrastructure”, report of the Interagency Working Group on Cryptography Policy, May 12, 1996; [quote from paragraph 5 of the Introduction]

    Google Scholar 

  9. SPKI documents: http://www.clark.net/pub/cme/html/spki.html

  10. Winn, Jane K., Couriers Without Luggage: Negotiable Instruments and Digital Signatures, 49 S.C. L. Rev. (forthcoming May 1998).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ellison, C. (1998). The Trust Shell Game. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-49135-X_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65663-0

  • Online ISBN: 978-3-540-49135-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics