Sciweavers

ICICS
1997
Springer

An implementable scheme for secure delegation of computing and data

14 years 4 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, delegation should be performed in a way that preserves security. Uses of delegation range from public administration to smart cards. In this paper, correctness and security requirements as well as protocols are specified for delegation of computing and data. A cryptographic solution to the secure delegation problem is described which provides data confidentiality and computation verifiability. Finally, an implementation allowing secure delegation of information over the Internet is briefly discussed.
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti
Added 08 Aug 2010
Updated 08 Aug 2010
Type Conference
Year 1997
Where ICICS
Authors Josep Domingo-Ferrer, Ricardo X. Sanchez del Castillo
Comments (0)