In this paper, we explore the use of Key Assignment Schemes in entity authentication protocols where authentication requires the claiment to demonstrate knowledge of a derivable key. By controlling the distribution of such keys, restrictions may be efficiently placed upon the circumstances under which an entity may be authenticated and the services to which they may gain access. We explore how standardized protocols may be extended to authenticate entities as members of a group associated to a particular security label, whilst protecting the long-term secrets in the system. We also see that such constructions may allow for authentication whilst preserving anonymity. © 2013 Springer-Verlag.
CITATION STYLE
Alderman, J., & Crampton, J. (2013). On the use of key assignment schemes in authentication protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7873 LNCS, pp. 607–613). https://doi.org/10.1007/978-3-642-38631-2_46
Mendeley helps you to discover research relevant for your work.