Authentication in trusted subsystem model using commutative encryption
Prikladnaâ diskretnaâ matematika, no. 3 (2010), pp. 90-95.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper considers the peculiarities of authentication in multi-tier environment and corresponding security problems. The authentication protocol for multi-tier system based on commutative encryption is provided. Also, some specific commutative encryption algorithms are considered.
Keywords: multi-tier systems, authentication in multi-tier systems, commutative encryption.
@article{PDM_2010_3_a7,
     author = {P. A. Pautov},
     title = {Authentication in trusted subsystem model using commutative encryption},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {90--95},
     publisher = {mathdoc},
     number = {3},
     year = {2010},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2010_3_a7/}
}
TY  - JOUR
AU  - P. A. Pautov
TI  - Authentication in trusted subsystem model using commutative encryption
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2010
SP  - 90
EP  - 95
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2010_3_a7/
LA  - ru
ID  - PDM_2010_3_a7
ER  - 
%0 Journal Article
%A P. A. Pautov
%T Authentication in trusted subsystem model using commutative encryption
%J Prikladnaâ diskretnaâ matematika
%D 2010
%P 90-95
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2010_3_a7/
%G ru
%F PDM_2010_3_a7
P. A. Pautov. Authentication in trusted subsystem model using commutative encryption. Prikladnaâ diskretnaâ matematika, no. 3 (2010), pp. 90-95. http://geodesic.mathdoc.fr/item/PDM_2010_3_a7/

[1] Chong F., Trusted Subsystem Design, MSDN , 2006 http://msdn.microsoft.com/en-us/library/aa905320.aspx

[2] Pautov P. A., “Problema autentifikatsii v mnogourovnevykh prilozheniyakh”, Prikladnaya diskretnaya matematika, 2008, no. 2, 87–90

[3] Schneier B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, 1996, 785 pp. | Zbl

[4] Bao F., Deng R. H., Feng P., “An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods”, LNCS, 2015, 2001, 162–170 | Zbl