{"title":"Cryptographic sealing for information secrecy and authentication","authors":"D. Gifford","doi":"10.1145/800216.806599","DOIUrl":null,"url":null,"abstract":"The problem of computer security can be considered to consist of four distinct components: secrecy (ensuring that information is only disclosed to authorized users), authentication (ensuring that information is not forged), integrity (ensuring that information is not destroyed), and availability (ensuring that access to information can not be maliciously interrupted). The paper describes a new protection mechanism called cryptographic sealing that provides primitives for secrecy and authentication. The mechanism is enforced with a synthesis of classical cryptography, public-key cryptography, and a threshold scheme.","PeriodicalId":262012,"journal":{"name":"Proceedings of the eighth ACM symposium on Operating systems principles","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1981-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the eighth ACM symposium on Operating systems principles","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800216.806599","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The problem of computer security can be considered to consist of four distinct components: secrecy (ensuring that information is only disclosed to authorized users), authentication (ensuring that information is not forged), integrity (ensuring that information is not destroyed), and availability (ensuring that access to information can not be maliciously interrupted). The paper describes a new protection mechanism called cryptographic sealing that provides primitives for secrecy and authentication. The mechanism is enforced with a synthesis of classical cryptography, public-key cryptography, and a threshold scheme.