[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/646757.705519guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Fair Public-Key Cryptosystems

Published: 16 August 1992 Publication History

Abstract

We show how to construct public-key cryptosystems that are fair, that is, strike a good balance, in a democratic country, between the needs of the Government and those of the Citizens. Fair public-key cryptosystems guarantee that: (1) the system cannot be misused by criminal organizations and (2) the Citizens mantarn exactly the same rights to privacy they currently have under the law.We actually show how to transform any public-key cryptosystem into a fair one. The transformed systems preserve the security and efficiency of the original ones. Thus one can still use whatever system he believes to be more secure, and enjoy the additional properties of fairness. Moreover, for today's best known cryptosystems, we show that the transformation to fair ones is particularly efficient and convenient.As we shall explain, our solution compares favorably with the Clipper Chip, the encryption proposal more recently put forward by the Clinton Administration for solving similar problems.

References

[1]
B. Awerbuch, B. Chor, S. Goldwasser and S. Micali. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. In Proceedings of the 26th Annual IEEE Symposium of Foundations of Computer Science . IEEE, New York, 1986, pp. 383-395.
[2]
J. Benaloh. Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret. Advances in Cryptoiogy -Proceedings of Crypto '86. Springer Verlag, 1986.
[3]
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness Theorems for Fault-Tolerant Distributed Computing. In Proceedings of the 20th ACM Symposium of Theory of Computing . ACM, New York, 1988, pp. 1-10.
[4]
G. Blakley. Safeguarding Cryptographic Kevs. In AFIPS - Conference Proceedings . NCC, New Jersey, 1979, Vol. 48 (June), pp. 313-317.
[5]
M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. Siam Journal on Computing , 1984, vol. 13 (Novenber), pp. 850-863. Proceeding Version: FOCS 1982.
[6]
D. Chaum, C. Crepeau, and I. Damgard. Multi-party Unconditionally Secure Protocols. In Proceedings of the 20th ACM Symposium of Theory of Computing . ACM, New York, 1988, pp. 11-19.
[7]
W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Trans. Inform. Theory . IT-22, 6 (Nov. 1976), IEEE, New York, pp. 644-554.
[8]
P. Feldman. A Practical Scheme for Non-Interactive verifiable Secret Sharing. In Proceedings of the 28th Annual IEEE Symposium of Foundations of Computer Science . IEEE, New York, 1987, pp. 427-438.
[9]
S. Goldwasser and S. Micali. Probabilistic Encryption. Journal of Computer Systems Science . Academic Press, New York, Vol. 28 No. 2 (1984). pp. 270-299.
[10]
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield Nothing but their Validity and a Methodology of Cryptographic Protocol Design. In Proceedings of the 27th Annual IEEE Symposium of Foundations of Computer Science . IEEE, New York, 1986, pp. 174-187.
[11]
O. Goldreich, S. Micali, and A. Wigderson. How To Play ANY Mental Game or A Completeness Theorem for Protocols with Honest Majority. In Proceedings of the 19th Annual ACM Symposium of Theory of Computing . ACM, New York, 1987, pp. 218-229.
[12]
T. Rabin and M. Ben-Or. Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In Proceedings of the 21st ACM Symposium of Theory of Computing . ACM, New York, 1989, pp. 73-85.
[13]
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystens. Comm. ACM 21, 2 (Feb. 1978), pp. 120-126.
[14]
A. Shamir. How to Share a Secret. Communications of the ACM . ACM, New York, 1979, Vol. 22, No. 11 (Nov.), pp. 612-613.

Cited By

View all
  • (2011)Privacy and anonymity in untrusted data storesProceedings of the Twenty-Second Australasian Database Conference - Volume 11510.5555/2460396.2460407(75-84)Online publication date: 17-Jan-2011
  • (2011)A practical (non-interactive) publicly verifiable secret sharing schemeProceedings of the 7th international conference on Information security practice and experience10.5555/2009103.2009130(273-287)Online publication date: 30-May-2011
  • (2011)Publicly verifiable secret sharing for cloud-based key managementProceedings of the 12th international conference on Cryptology in India10.1007/978-3-642-25578-6_21(290-309)Online publication date: 11-Dec-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
August 1992
593 pages
ISBN:3540573402

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 16 August 1992

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2011)Privacy and anonymity in untrusted data storesProceedings of the Twenty-Second Australasian Database Conference - Volume 11510.5555/2460396.2460407(75-84)Online publication date: 17-Jan-2011
  • (2011)A practical (non-interactive) publicly verifiable secret sharing schemeProceedings of the 7th international conference on Information security practice and experience10.5555/2009103.2009130(273-287)Online publication date: 30-May-2011
  • (2011)Publicly verifiable secret sharing for cloud-based key managementProceedings of the 12th international conference on Cryptology in India10.1007/978-3-642-25578-6_21(290-309)Online publication date: 11-Dec-2011
  • (2010)Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-CalculusACM Transactions on Information and System Security10.1145/1880022.188003513:4(1-29)Online publication date: 1-Dec-2010
  • (2007)Anonymity protocol with identity escrow and analysis in the applied π-calculusProceedings of the 3rd conference on Trustworthy global computing10.5555/1793574.1793598(330-346)Online publication date: 5-Nov-2007
  • (2005)On anonymity with identity escrowProceedings of the Third international conference on Formal Aspects in Security and Trust10.1007/11679219_17(235-243)Online publication date: 18-Jul-2005
  • (2005)GBD threshold cryptography with an application to RSA key recoveryProceedings of the 10th Australasian conference on Information Security and Privacy10.1007/11506157_33(394-405)Online publication date: 4-Jul-2005
  • (2004)Uncoercible e-Bidding GamesElectronic Commerce Research10.1023/B:ELEC.0000009284.64158.0a4:1-2(113-125)Online publication date: 1-Jan-2004
  • (2004)Accountable privacyProceedings of the 12th international conference on Security Protocols10.1007/11861386_10(83-95)Online publication date: 26-Apr-2004
  • (2002)Efficient zero-knowledge proofs for some practical graph problemsProceedings of the 3rd international conference on Security in communication networks10.5555/1766811.1766840(290-302)Online publication date: 11-Sep-2002
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media