Trust-rated Authentication for Domain-Structured Distributed Systems

Ralph-Günther Holz, Heiko Niedermayer, Peter Hauck, Georg Carle

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)


We present an authentication scheme and new protocol for domain-based scenarios with inter-domain authentication. Our protocol is primarily intended for domain-structured Peer-to-Peer systems but is applicable for any domain scenario where clients from different domains wish to authenticate to each other. To this end, we make use of Trusted Third Parties in the form of Domain Authentication Servers in each domain. These act on behalf of their clients, resulting in a four-party protocol. If there is a secure channel between the Domain Authentication Servers, our protocol can provide secure authentication. To address the case where domains do not have a secure channel between them, we extend our scheme with the concept of trust-rating. Domain Authentication Servers signal security-relevant information to their clients (pre-existing secure channel or not, trust, ...). The clients evaluate this information to decide if it fits the security requirements of their application.
Original languageEnglish
Title of host publicationPublic Key Infrastructure
Subtitle of host publication5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings
EditorsStig F. Mjølsnes, Sjouke Mauw, Sokratis K. Katsikas
Place of PublicationBerlin, Heidelberg
ISBN (Electronic)978-3-540-69485-4
ISBN (Print)978-3-540-69484-7
Publication statusPublished - 2008
Externally publishedYes
Event5th European Workshop on Public Key Infrastructure, EuroPKI 2008 - Trondheim, Norway
Duration: 16 Jun 200817 Jun 2008
Conference number: 5


Conference5th European Workshop on Public Key Infrastructure, EuroPKI 2008
Abbreviated titleEuroPKI


  • Authentication
  • Protocols
  • PKI
  • Trust-rating
  • Multi-domain
  • Distributed systems
  • Peer-to-peer


Dive into the research topics of 'Trust-rated Authentication for Domain-Structured Distributed Systems'. Together they form a unique fingerprint.

Cite this