PUBLIC-RANDOMNESS IN PUBLIC-KEY CRYPTOGRAPHY

被引:0
|
作者
DESANTIS, A
PERSIANO, G
机构
[1] UNIV SALERNO,DIPARTIMENTO INFORMAT & APPL,I-84081 SALERNO,ITALY
[2] HARVARD UNIV,AIKEN COMP LAB,CAMBRIDGE,MA 02138
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this work we investigate the power of Public Randomness in the context of Public-key cryptosystems. We consider the Diffie-Hellman Public-key model in which an additional short random string is shared by all users. This, which we call Public-Key Public-Randomness (PKPR) model, is very powerful as we show that it supports simple non-interactive implementations of important cryptographic primitives. We give the first completely non-interactive implementation of Oblivious Transfer. Our implementation is also secure against receivers with unlimited computational power. We propose the first implementation of non-interactive nature for Perfect Zero-Knowledge in the dual model of Brassard, Crepeau, and Chaum for all NP-languages.
引用
收藏
页码:46 / 62
页数:17
相关论文
共 50 条
  • [1] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [2] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [3] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [4] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [5] NONINTERACTIVE PUBLIC-KEY CRYPTOGRAPHY
    MAURER, UM
    YACOBI, Y
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 498 - 507
  • [6] UNTANGLING PUBLIC-KEY - CRYPTOGRAPHY
    SCHNEIER, B
    DR DOBBS JOURNAL, 1992, 17 (05): : 16 - &
  • [7] A reconfigurable public-key cryptography coprocessor
    Zeng, XY
    Chen, C
    Zhang, QL
    PROCEEDINGS OF 2004 IEEE ASIA-PACIFIC CONFERENCE ON ADVANCED SYSTEM INTEGRATED CIRCUITS, 2004, : 172 - 175
  • [8] PRIVACY, FREEDOM AND PUBLIC-KEY CRYPTOGRAPHY
    RICE, R
    INFORMATION AGE, 1986, 8 (04): : 208 - 214
  • [9] A Cryptocurrency Without Public-Key Cryptography
    Bonneau, Joseph
    Miller, Andrew
    SECURITY PROTOCOLS XXII, 2014, 8809 : 350 - 358
  • [10] Emerging standards for public-key cryptography
    Kaliski, BS
    LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 87 - 104