A Secure Scheme for Chained Authentication Combined with Attestation

Research output: Chapter in Book/Report/Conference proceedingConference proceedingspeer-review

Abstract

It may be desirable to split computation into several parts and perform them on remote systems, see e.g. microservices. However, not always are these services directly and publicly available. For instance, if the calculation is performed at home, no public IP address may be available. Or the exact location of the computation should remain hidden. In these cases, the remote party may be identified solely as a Tor onion service or some anonymous cloud provider. It is then desirable to pass on the work only if the recipient can still be identified as trustworthy, e.g. by remote attestation (guaranteeing a specific calculation via the actual executable and its secure environment). Even if the location and identity of the operator is known, this is very desirable. Moreover, each entity in a chain of calculation should remain oblivious of all non-directly connected steps and any authentication information for those, including any additional data or the exact work instructions. This paper proposes a scheme to pass on work packages in a secure manner to a verified next step, while keeping all non-directly involved data hidden.

Original languageEnglish
Title of host publicationIDIMT 2025 - ICT in Business
Subtitle of host publicationAI Everywhere? Glory and Disgrace of AI - 33rd Interdisciplinary Information Management Talks
EditorsPetr Doucek, Michael Sonntag, Lea Nedomova
PublisherTRAUNER Verlag
Pages55 - 62
Number of pages8
ISBN (Electronic)9783991518563
ISBN (Print)978-3-99151-856-3
DOIs
Publication statusPublished - 2025

Publication series

NameSchriftenreihe Informatik
Number54

Fields of science

  • 505015 Legal informatics
  • 102016 IT security
  • 102 Computer Sciences

JKU Focus areas

  • Digital Transformation

Cite this