Cryptographic sealing for information secrecy and authentication
- 1 April 1982
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 25 (4) , 274-286
- https://doi.org/10.1145/358468.358493
Abstract
A new protection mechanism is described that provides general primitives for protection and authentication. The mechanism is based on the idea of sealing an object with a key. Sealed objects are self-authenticating, and in the absence of an appropriate set of keys, only provide information about the size of their contents. New keys can be freely created at any time, and keys can also be derived from existing keys with operators that include Key-And and Key-Or . This flexibility allows the protection mechanism to implement common protection mechanisms such as capabilities, access control lists, and information flow control. The mechanism is enforced with a synthesis of conventional cryptography, public-key cryptography, and a threshold scheme.Keywords
This publication has 14 references indexed in Scilit:
- PrefaceIBM Systems Journal, 1980
- How to share a secretCommunications of the ACM, 1979
- Privacy and authentication: An introduction to cryptographyProceedings of the IEEE, 1979
- Adding capability access to conventional file serversACM SIGOPS Operating Systems Review, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- A lattice model of secure information flowCommunications of the ACM, 1976
- Protection in programming languagesCommunications of the ACM, 1973
- Programming semantics for multiprogrammed computationsCommunications of the ACM, 1966