Abstract.
Literally, the word compliance suggests conformity in fulfilling official requirements. This paper presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCPs). The paper presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCPs are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities.
Similar content being viewed by others
Author information
Authors and Affiliations
Additional information
Published online: 15 November 2002
Rights and permissions
About this article
Cite this article
Dawson, E., Viswanathan, K. & Boyd, C. Compliant cryptologic protocols . IJIS 1, 189–202 (2002). https://doi.org/10.1007/s10207-002-0016-y
Issue Date:
DOI: https://doi.org/10.1007/s10207-002-0016-y