Skip to main content

Ω key management service

Publication ,  Conference
Reiter, MK; Franklin, MK; Lacy, JB; Wright, RN
Published in: Proceedings of the ACM Conference on Computer and Communications Security
January 1, 1996

In this paper we introduce Ω, a distributed public key management service for open networks. Ω offers interfaces by which clients can register, retrieve, and revoke public keys, and escrow, use (to decrypt messages), and recover private keys, all of which can be subjected to access control policy. Ω is built using multiple servers in a way that ensures its correct operation despite the malicious corruption of fewer than one-third of its component servers. We describe the design of Ω, the protocols underlying its operation, performance in our present implementation, and an experimental application of the service.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

Publication Date

January 1, 1996

Start / End Page

38 / 47
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Reiter, M. K., Franklin, M. K., Lacy, J. B., & Wright, R. N. (1996). Ω key management service. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 38–47). https://doi.org/10.1145/238168.238184
Reiter, M. K., M. K. Franklin, J. B. Lacy, and R. N. Wright. “Ω key management service.” In Proceedings of the ACM Conference on Computer and Communications Security, 38–47, 1996. https://doi.org/10.1145/238168.238184.
Reiter MK, Franklin MK, Lacy JB, Wright RN. Ω key management service. In: Proceedings of the ACM Conference on Computer and Communications Security. 1996. p. 38–47.
Reiter, M. K., et al. “Ω key management service.” Proceedings of the ACM Conference on Computer and Communications Security, 1996, pp. 38–47. Scopus, doi:10.1145/238168.238184.
Reiter MK, Franklin MK, Lacy JB, Wright RN. Ω key management service. Proceedings of the ACM Conference on Computer and Communications Security. 1996. p. 38–47.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

DOI

Publication Date

January 1, 1996

Start / End Page

38 / 47