The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web

Much research on Internet security has concentrated on generic mechanisms such as firewalls, IP authentication and protocols for large scale key distribution. However, once we start to look at specific applications, some quite different requirements appear. We set out to build an infrastructure that would support the reliable electronic distribution of books on which doctors depend when making diagnostic and treatment decisions, such as care protocols, drug formularies and government notices. The integrity, authenticity and timeliness of this information is important for both safety and medico-legal purposes. We initially tried to implement a signature hierarchy based on X.509 but found that this had a number of shortcomings. We therefore developed an alternative means of managing trust in electronic publishing. This has a number of advantages which may commend it in other applications. It does not use export-controlled cryptography; it uses much less computation than digital signature mechanisms; and it provides a number of features that may be useful in environments where we are worried about liability. We also present our intermediate solution-the first ever large scale deployment of one-time signature systems. The move to one-time signatures enabled considerable simplification, cost reduction and performance improvement. We believe that similar mechanisms may be appropriate for protecting other information that changes slowly and remains available over long time periods. Book and journal publishing in general appear to be strong candidates.

[1]  J S Horner Computers Can Be Compatible with Confidentiality , 1997, Journal of the Royal College of Physicians of London.

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Ross J. Anderson,et al.  Secure Books: Protecting the Distribution of Knowledge , 1997, Security Protocols Workshop.

[4]  Horner Js Computers can be compatible with confidentiality. , 1997 .

[5]  Ross J. Anderson,et al.  A security policy model for clinical information systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[6]  I Buchan,et al.  Coherent exchange of healthcare knowledge in open systems. , 1997, Studies in health technology and informatics.

[7]  Bruce Christianson,et al.  Binding Bit Patterns to Real World Entities , 1997, Security Protocols Workshop.

[8]  Chris J. Mitchell,et al.  A Proposed Architecture for Trusted Third Party Services , 1995, Cryptography: Policy and Algorithms.

[9]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[10]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.