Designing secure communication protocols from trust specifications | Algorithmica Skip to main content
Log in

Designing secure communication protocols from trust specifications

  • Published:
Algorithmica Aims and scope Submit manuscript

Abstract

In a very large distributed system, entities may trust and mistrust others with respect to communication security in arbitrarily complex ways. We formulate the problem of designing a secure communication protocol, given a network interconnection and a ternary relation which captures trust between the entities. We didentify several important ways of synthesizing secure channels, and study the algorithmic problem of designing a secure communication protocol connecting the entities, given the connectivity of the network and the trust relationship between the nodes. We show that whether secure communication is possible can be decided easily in polynomial time. If we also require that channel synthesis proceed along unambiguous paths (in which case the protocol is defined on a spanning tree of the network), we show that the design problem is NP-complete, and we give a linear-time algorithm for an interesting special case of the problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. D. Birrell, B. W. Lampson, R. M. Needham, and M. D. Schroeder. A global authentication service without global trust,Proc. IEEE Symposium on Security and Privacy, 1986.

  2. M. R. Garey and D. S. Johnson.Computers and Intractability: A Guide to the Theory of NP-Completeness, Freeman, San Francisco, 1979.

    Google Scholar 

  3. C. H. Papadimitriou and K. Steiglitz.Combinatorial Optimization: Algorithms and Complexity, Prentice-Hall, Englewood Cliffs, NJ, 1982.

    Google Scholar 

  4. V. Rangan. An axiomatic theory of trust in secure communication protocols,Journal of Computers and Security, to appear.

Download references

Author information

Authors and Affiliations

Authors

Additional information

Communicated by C. K. Wong.

Research supported by the ESPRIT Basic Research Action No. 3075 ALCOM, a grant from the Volkswagen Foundation to the Universities of Patras and Bonn, and by the NSF.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Papadimitriou, C.H., Rangan, V. & Sideri, M. Designing secure communication protocols from trust specifications. Algorithmica 11, 485–499 (1994). https://doi.org/10.1007/BF01293268

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01293268

Key words

Navigation