Abstract
This paper deals with and gives some solutions to the problem of how a small device such as a smart card can efficiently execute secret computations using computing power of auxiliary devices like (banking-, telephone-, . . .) terminals which are not necessarily trusted. One of the solutions shows that the RSA signatures can be practically generated by a smart card.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Svigals, J., Smart Cards: The Ultimate Personal Computer, Macmillan, 1985.
Matsumoto, T., Kato, K. and Imai, H., “Smart cards can compute secret heavy functions with powerful terminals,” (written in Japanese with an English abstract) Proc. of 10 thSymposium on Information Theory and Its Applications, Enoshima-Island, Japan, pp.17–22, Nov.19–21, 1987.
Rivest, R., Adleman, L. and Dertouzos, M., “On databanks and privacy homomorphisms,” Foundations of Secure Computation. Demillo, R.A. et al., editors, Academic Press, pp.168–177, 1978.
Brickell, E.F. and Yacobi, Y., “On privacy homomorphisms,” Advances in Cryptology-EUROCRYPT’87, Chaum, D. and Price, W.L. editors, Springer-Verlag, pp.117–125, 1988.
Ahituv, N., Lapid, Y. and Neumann, S., “Processing encrypted data,” Communications of the ACM, Vol.30, No.9, pp.777–780, Sep. 1987.
Matsumoto, T., Okada, T. and Imai, H., “Directly transformed link encryption,” (in Japanese) Trans. of IECE Japan, Vol.J65-D, No.11, pp.1443–1450, Nov. 1982.
Feigenbaum, J., “Encrypting problem instances, or,..., Can you take advantage of someone without having to trust him?” Advances in Cryptology-CRYPTO’85, Williams, H.C. editor, Springer-Verlag, pp.477–488, 1986.
Abadi, M., Feigenbaum, J. and Kilian, J., “On hiding information from an oracle,” to appear in Journal of Computer and System Sciences. An extended abstract appeared in Proc. of 19 thSymposium on Theory of Computation, pp.195–203, May, 1987.
Matsumoto, T. and Imai, H., “How to use servers without releasing privacy — Making IC cards more powerful —,” (in Japanese) IEICE Technical Report (ISEC), Vol.88, No.33, pp.53–59, May 1988.
Rabin, M.O., “Probabilistic algorithms in finite fields,” SIAM J. Comput., Vol.9, No.2, pp.273–280, May 1980.
Rivest, R., Shamir, A. and Adleman, L., “A method of obtaining digital signatures and public key cryptosystems,” Comm. of ACM, Vol.21, No.2, pp.120–126, Feb. 1978.
Quisquater, J.J. and Couvreuer, C, “Fast decipherment algorithm for RSA public-key cryptosystem,” Electron. Lett. Vol.18, No.21, pp.905–907, Oct. 1982.
Koyama, K., Table 1.(Developments of hardwares for the RSA cryptosystem), in “Information Security for Communications,” (in Japanese) to appear in Journal of the Institute of Television Engineers of Japan, Dec. 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Matsumoto, T., Kato, K., Imai, H. (1990). Speeding Up Secret Computations with Insecure Auxiliary Devices. In: Goldwasser, S. (eds) Advances in Cryptology — CRYPTO’ 88. CRYPTO 1988. Lecture Notes in Computer Science, vol 403. Springer, New York, NY. https://doi.org/10.1007/0-387-34799-2_35
Download citation
DOI: https://doi.org/10.1007/0-387-34799-2_35
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97196-4
Online ISBN: 978-0-387-34799-8
eBook Packages: Springer Book Archive