Ω key management service

Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca Wright

Research output: Contribution to journalArticle

21 Citations (Scopus)

Abstract

In this paper we introduce Ω, a distributed public key management service for open networks. Ω offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to decrypt messages), and recover private keys, all of which can be subjected to access control policy. Ω is built using multiple servers in a way that ensures its correct operation despite the malicious corruption of fewer than one-third of its component servers. We describe the design of Ω, the protocols underlying its operation, performance in our present implementation, and an experimental application of the service.

Original languageEnglish (US)
Pages (from-to)267-287
Number of pages21
JournalJournal of Computer Security
Volume4
Issue number4
DOIs
StatePublished - Jan 1 1996
Externally publishedYes

Fingerprint

Servers
Access control
Network protocols

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Reiter, M. K., Franklin, M. K., Lacy, J. B., & Wright, R. (1996). Ω key management service. Journal of Computer Security, 4(4), 267-287. https://doi.org/10.3233/JCS-1996-4402
Reiter, Michael K. ; Franklin, Matthew K. ; Lacy, John B. ; Wright, Rebecca. / Ω key management service. In: Journal of Computer Security. 1996 ; Vol. 4, No. 4. pp. 267-287.
@article{80be1a3afc6c4791a49b0cd2a8a112f1,
title = "Ω key management service",
abstract = "In this paper we introduce Ω, a distributed public key management service for open networks. Ω offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to decrypt messages), and recover private keys, all of which can be subjected to access control policy. Ω is built using multiple servers in a way that ensures its correct operation despite the malicious corruption of fewer than one-third of its component servers. We describe the design of Ω, the protocols underlying its operation, performance in our present implementation, and an experimental application of the service.",
author = "Reiter, {Michael K.} and Franklin, {Matthew K.} and Lacy, {John B.} and Rebecca Wright",
year = "1996",
month = "1",
day = "1",
doi = "10.3233/JCS-1996-4402",
language = "English (US)",
volume = "4",
pages = "267--287",
journal = "Journal of Computer Security",
issn = "0926-227X",
publisher = "IOS Press",
number = "4",

}

Reiter, MK, Franklin, MK, Lacy, JB & Wright, R 1996, 'Ω key management service', Journal of Computer Security, vol. 4, no. 4, pp. 267-287. https://doi.org/10.3233/JCS-1996-4402

Ω key management service. / Reiter, Michael K.; Franklin, Matthew K.; Lacy, John B.; Wright, Rebecca.

In: Journal of Computer Security, Vol. 4, No. 4, 01.01.1996, p. 267-287.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Ω key management service

AU - Reiter, Michael K.

AU - Franklin, Matthew K.

AU - Lacy, John B.

AU - Wright, Rebecca

PY - 1996/1/1

Y1 - 1996/1/1

N2 - In this paper we introduce Ω, a distributed public key management service for open networks. Ω offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to decrypt messages), and recover private keys, all of which can be subjected to access control policy. Ω is built using multiple servers in a way that ensures its correct operation despite the malicious corruption of fewer than one-third of its component servers. We describe the design of Ω, the protocols underlying its operation, performance in our present implementation, and an experimental application of the service.

AB - In this paper we introduce Ω, a distributed public key management service for open networks. Ω offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to decrypt messages), and recover private keys, all of which can be subjected to access control policy. Ω is built using multiple servers in a way that ensures its correct operation despite the malicious corruption of fewer than one-third of its component servers. We describe the design of Ω, the protocols underlying its operation, performance in our present implementation, and an experimental application of the service.

UR - http://www.scopus.com/inward/record.url?scp=0030376048&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0030376048&partnerID=8YFLogxK

U2 - 10.3233/JCS-1996-4402

DO - 10.3233/JCS-1996-4402

M3 - Article

AN - SCOPUS:0030376048

VL - 4

SP - 267

EP - 287

JO - Journal of Computer Security

JF - Journal of Computer Security

SN - 0926-227X

IS - 4

ER -