Computational trust

In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication mechanisms, such as public key infrastructures (PKIs)[1] or Kerberos,[2] have allowed this model to be extended to distributed systems within a few closely collaborating domains or within a single administrative domain. During recent years, computer science has moved from centralised systems to distributed computing. This evolution has several implications for security models, policies and mechanisms needed to protect users’ information and resources in an increasingly interconnected computing infrastructure.[3]

Identity-based security mechanisms cannot authorise an operation without authenticating the claiming entity. This means that no interaction can occur unless both parties are known by their authentication frameworks. Spontaneous interactions would, therefore, require a single, or a few trusted certificate authorities (CAs). In the present context, PKI has not been considered since they have issues[which?], thus it is unlikely that they will establish themselves as a reference standard in the near future. A user who wishes to collaborate with another party can choose between enabling security and thereby disabling spontaneous collaboration, or disabling security and enabling spontaneous collaboration. It is fundamental that mobile users and devices can authenticate in an autonomous way without relying on a common authentication infrastructure. In order to face this problem, we need to examine the challenges introduced by "global computing",[4] a term coined by the EU for the future of the global information society, and to identify their impact on security.

Cryptocurrencies, such as Bitcoin, use methods such as proof of work (PoW) to achieve computational trust inside the transaction network.

  1. ^ Weise, J. (August 2001). "Public Key Infrastructure Overview". SunPs Global Security Practice, SunMicrosystems. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ Kohl J.; B. C. Neuman (1993). "The Kerberos Network Authentication Service(Version 5)". Internet Request for Comments RFC-1510. {{cite journal}}: Cite journal requires |journal= (help)
  3. ^ Seigneur J.M. (2005). "Trust, Security and Privacy in Global Computing". PhD Thesis, University of Dublin, Trinity College. {{cite journal}}: Cite journal requires |journal= (help)
  4. ^ "IST, Global Computing, EU". 2004. Archived from the original on 2006-04-27. Retrieved 2008-08-11. {{cite journal}}: Cite journal requires |journal= (help)