Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Relation to Other Types of Schemes

Three related types of cryptologic schemes are not always precisely distinguished from digital signature schemes  [Pg.8]

Mere authentication schemes also serve to ensure the authenticity of messages The recipient of a message with correct authentication can also be sure that the supposed sender has sent or agreed to send exactly this message. However, he cannot make anybody else believe this. In particular, the authentication does not help him in court. More precisely, from the point of view of a third party, the recipient could usually have produced the authenticated message just as well as the supposed sender. The purpose of these schemes is therefore to help people who trust each other to ensure that their messages have not been modified or forged by outsiders. [Pg.8]

This symmetry between senders and recipients is usually reflected in the system structure the schemes are then called symmetric authentication schemes (see Section 2.1). In contrast, digital signature schemes are sometimes called asymmetric authentication schemes. However, schemes exist that provide mere authentication and are not symmetric in this sense [OkOh91] (called non-transitive signature schemes there). [Pg.8]

Identification schemes only serve to authenticate a person or a device. In contrast to authentication schemes, this person or device does not want to transmit a particular message. Thus, identification schemes can mainly be used where certain people are to be granted physical access to buildings or areas A small computer that they carry with them, e.g., on a smartcard, can carry out such an identification protocol. However, in situations where more digital communication follows after the original identification, all the following messages have to be authenticated, too. [Pg.8]

From every authentication scheme (mere authentication or signatures), a corresponding identification scheme can be constructed for instance, authenticated messages I am now.here,. .. , with a time stamp, can be sent. The reverse [Pg.8]


See other pages where Relation to Other Types of Schemes is mentioned: [Pg.8]    [Pg.9]   


SEARCH



Other Schemes

Type Relations

© 2024 chempedia.info