Abstract
In this paper, we demonstrate that it is possible to develop an authentication service as an integral part of a distributed operating system, subject to some requirements and extensions to the original Koyama-Ohta system. The basic RHODOS requirement is that users cannot be trusted, and therefore they cannot hold any cryptographic parameters, but their own passwords. The Authentication Service supported by the RHODOS distributed operating system provides the following operations: the distribution of the initial cryptographic parameters, user login authentication, one-way and two-way authentication, and conference authentication. The operational properties have been demonstrated by setting up a conference and authenticating conference participants in different circumstance.
This work was partly supported by the Australian Research Council under Grant A48831034.
Chapter PDF
Keywords
References
S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. Comput. Commun. Rev., 20(5):119–132, Oct. 1990.
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. on Info. Theory, IT-22(6):644–654, Nov 1976.
A. Goscinski and K. Beaton. A simple distributed computer system for supporting collaboration in distant and synchronous meetings. Computers in Industry, 12:95–106, 1989.
G. W. Gerrity, A. Goscinski, J. Indulska, W. Toomey, and W. Zhu. RHODOS — a testbed for studying design issues in distributed operating systems. In G. S. Poo, editor, Proceedings of the 2nd Singapore International Conference on Networks (SICON'92), pages 268–274, Sept. 3–6 1991.
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM J. Computing, 18(1):186–208, Frbruary 1989. A preliminary version of this paper appeared in the Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science, 1986, pp. 174–187.
A. Goscinski. Distributed Operating Systems: The Logical Design. Addison-Wesley, 1991.
A. Goscinski and J. Pieprzyk. Security in distributed operating systems. Datenschutz and Datensicherung, Heft 5:240–252, 1991.
K. Koyama and K. Ohta. Identity-based conference key distribution systems. In C. Pomerance, editor, Proceedings of CRYPTO'87, volume 293 of Lecture Notes in Computer Science, pages 175–184. Springer-Verlag, 1988.
K. Koyama and K. Ohta. Security of improved identity-based conference key distribution systems. In C. G. Günther, editor, Advances in Cryptology — EUROCRYPT'88, volume 330 of Lecture Notes in Computer Science, pages 11–19. Springer-Verlag, May 1988.
K. Koyama. Identity-based conference key distribution system. IEEE Electronic Letters, 23(10):495–496, May 7 1987.
J. F. Nunamaker, A. R. Dennis, J. S. Valacich, D. R. Vogel, and J. F. George. Electronic meeting systems to support group work. Communications of the ACM, 34(7):40–61, July 1991.
A. Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and David Chaum, editors, Advances in Cryptology — Proceedings of CRYPTO'84, volume 196 of Lecture Notes in Computer Science, pages 47–53. Springer-Verlag, Berlin, 1985.
A. Shimbo and S. Kawamura. Cryptanalysis of several conference key distribution schemes (Extended Abstract). In ASIACRYPT '91 Abstracts, pages 155–160, Fujiyoshida, Japan, Nov. 11–14, 1991.
J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of USENIX Winter Conference, pages 191–202, Dallas, Texas, February 1988.
J. Seberry and J. Pieprzyk. Cryptography: An Introduction to Computer Security. Prentice-Hall, 1989.
W. Toomey. Emulating a RHODOS process environment under Unix. Technical Report CS90/49, Dept. of Computer Science, University College, University of New South Wales, Canberra, December 1990.
Michael Y-C Wang. The development and study of selected aspects of communication security and authentication schemes for distributed systems. Master's thesis, School of Computer Science and Engineering, University of New South Wales, August 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
Wang, M., Goscinski, A. (1992). The development and testing of the identity-based conference key distribution system for the RHODOS distributed system. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013900
Download citation
DOI: https://doi.org/10.1007/BFb0013900
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive