Maintaining security in the presence of transient faults

Ran Canetti, Amir Herzberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

58 Scopus citations


Consider a multiparty system where parties may occasionally be “infected” by malicious, coordinated agents, called viruses. After some time the virus is expelled and the party wishes to regain its security. Since the leaving virus knows the entire contents of the infected party’s memory, a source of “fresh” randomness seems essential for regaining security (e.g., for selecting new keys). However, such an “on-line” source of randomness may not be always readily available. We describe a scheme which, using randomness only at the beginning of the computation, supplies each party with a new pseudorandom number at each round of communication. Each generated number is unpredictable by an adversary controlling the viruses, even if the party was infected in previous rounds. Our scheme is valid as long as in each round there is at least one noninfected party, and some of the communication links are secure. We describe an important application of our scheme to secure sign-on protocols.

Original languageEnglish
Title of host publicationAdvances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings
EditorsYvo G. Desmedt
PublisherSpringer Verlag
Number of pages14
ISBN (Print)9783540583332
StatePublished - 1994
Externally publishedYes
Event14th Annual International Cryptology Conference, CRYPTO 1994 - Santa Barbara , United States
Duration: 21 Aug 199425 Aug 1994

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume839 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference14th Annual International Cryptology Conference, CRYPTO 1994
Country/TerritoryUnited States
CitySanta Barbara

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1994.


Dive into the research topics of 'Maintaining security in the presence of transient faults'. Together they form a unique fingerprint.

Cite this