PUBLIC-RANDOMNESS IN PUBLIC-KEY CRYPTOGRAPHY

被引:0
|
作者
DESANTIS, A
PERSIANO, G
机构
[1] UNIV SALERNO,DIPARTIMENTO INFORMAT & APPL,I-84081 SALERNO,ITALY
[2] HARVARD UNIV,AIKEN COMP LAB,CAMBRIDGE,MA 02138
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this work we investigate the power of Public Randomness in the context of Public-key cryptosystems. We consider the Diffie-Hellman Public-key model in which an additional short random string is shared by all users. This, which we call Public-Key Public-Randomness (PKPR) model, is very powerful as we show that it supports simple non-interactive implementations of important cryptographic primitives. We give the first completely non-interactive implementation of Oblivious Transfer. Our implementation is also secure against receivers with unlimited computational power. We propose the first implementation of non-interactive nature for Perfect Zero-Knowledge in the dual model of Brassard, Crepeau, and Chaum for all NP-languages.
引用
收藏
页码:46 / 62
页数:17
相关论文
共 50 条
  • [41] Public-key cryptography using paraunitary matrices
    Delgosha, Farshid
    Fekri, Faramarz
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (09) : 3489 - 3504
  • [42] A group theoretic approach to public-key cryptography
    Anshel, I
    Anshel, M
    Fisher, B
    Goldfeld, D
    UNUSUAL APPLICATIONS OF NUMBER THEORY, 2004, 64 : 17 - 23
  • [43] Method for realization of transformations in public-key cryptography
    P. Vasylenko Kharkiv National Technical University of Agriculture
    Telecommun Radio Eng, 2007, 17 (1559-1572):
  • [44] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [45] Secure fingerprinting using public-key cryptography
    Yoshiura, H
    Sasaki, R
    Takaragi, K
    SECURITY PROTOCOLS, 1999, 1550 : 83 - 94
  • [46] Using probabilistic argumentation for key validation in public-key cryptography
    Haenni, R
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2005, 38 (03) : 355 - 376
  • [47] STATE OF THE ART IN PUBLIC-KEY TECHNIQUES - RANDOMNESS AND REDUNDANCY
    GUILLOU, LC
    DAVIO, M
    QUISQUATER, JJ
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 1988, 43 (9-10): : 489 - 505
  • [48] Distributed Public-Key Cryptography from Weak Secrets
    Abdalla, Michel
    Boyen, Xavier
    Chevalier, Celine
    Pointcheval, David
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 139 - +
  • [49] A Petri net based public-key cryptography: PNPKC
    Ge, QW
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (06): : 1532 - 1535
  • [50] ZERO-KNOWLEDGE ARGUMENTS AND PUBLIC-KEY CRYPTOGRAPHY
    DESANTIS, A
    DICRESCENZO, G
    PERSIANO, G
    INFORMATION AND COMPUTATION, 1995, 121 (01) : 23 - 40