files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
115
Views
1
Downloads

Multi-Party Security System

L.J. Mary and S.P. Rajagopalan
Page: 873-883 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Transaction protocols and network applications are rapidly changing from a simple client-server model towards multi-party, multi–purpose, multi– device models. The main objective of a model of Multi-Party Security System (Multi-PaSS) provides the security services like Security infrastructure, supporting secure transactions between several parties in an open global environment with registration, certification, distributed remote authentication and trusted security administration, Secure multi-party protocolsfor protection of transactions in transfer, storage, authenticity delegation, authorization forwarding, etc. and Security extensions of various network applications suitable for multi-party transactions providing user authentication, cryptography, certification function, message protection, etc.. The structure of the Multi-PaSS may be shown in the form of three layers. The bottom layer, called security platform, contains cryptographic modules and security tokens, such as ATM cards. The middle layer comprises a collection of security proxies (Multi-PaSS proxies), which can securely communicate with each other performing security operations in a multi-party environment. The top layer, security infrastructure, comprises multiple cross-certified Public Key Infrastructure (Multi-PKI domains) and other supporting servers. All participants of a transaction must communicate through Multi-PaSS proxyservers and they handle authentication and all transactions between them. This authentication is performed using sequentialand parallelconcept. Since, MPT protocol messages contain corresponding timestamps, verifiers can verify creation time and verification time. Multiple signatures together with timestamps provide authenticity, integrity and non-repudiation security services for multi-party transactions.


How to cite this article:

L.J. Mary and S.P. Rajagopalan . Multi-Party Security System.
DOI: https://doi.org/10.36478/ajit.2007.873.883
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2007.873.883