File(s) not publicly available
Performance of the star-based and ring-based conference authentication facilities
journal contributionposted on 2023-02-07, 01:46 authored by Andrzej GoscinskiAndrzej Goscinski, D De Paoli
A feasible and secure conference authentication service utilising either a star formation or a ring formation has been developed for a network based operating system (e.g. Unix) and specifically to be used within a distributed operating system, in particular the RHODOS distributed operating system. This service is based on the Identity Based Conference Key Distribution System (ICKDS), proposed by Koyama-Ohta. The service has one central trusted authentication server and a set of authentication agents local to each workstation. When a user logs in, the central server is consulted using a zero-knowledge protocol to confirm that the users password is correct. If the user has typed in the correct password, then the central server distributes cryptographic parameters to the local authentication agent, rather than to users who are not trusted. These parameters are used by agents to authenticate users to each other. This report presents the performance of both a star- and a ring-based conference authentication scheme that has been developed utilising a software based encryption system, useable in a distributed system.