Abstract
This paper considers the problem of efficiently generating a sequence of secrets with the special property that the knowledge of one or several secrets does not help an adversary to find the other ones. This is achieved through one-way cross-trees, which may be seen as a multidimensional extension of the so-called one-way chains. In a dual way, some applications require the release of one or several secrets; oneway cross-trees allow to minimize the amount of data necessary to recover those secrets and only those ones.
Chapter PDF
Similar content being viewed by others
References
FIPS 180-1. Secure hash standard. Federal Information Processing Standards Publication 180-1, NIST, U.S. Department of Commerce, April 1995.
R. Anderson, H. Manifavas, and C. Sutherland. A practical electronic cash system. Available from URL 〈http://www.cl.cam.ac.uk/users/rja14/〉, 1995.
N. Asokan, G. Tsudik, and M. Waidner. Server-supported signatures. In E. Bertino, editor, Fourth European Symposium on Research in Computer Security (ESORICS’ 96), volume 1146 of Lecture Notes in Computer Science, pages 131–143. Springer-Verlag, 1996.
D. Bleichenbacher and U.M. Maurer. Directed acyclic graphs, one-way functions and digital signatures. In Y.G. Desmedt, editor, Advances in Cryptology —CRYPTO’94, volume 839 of Lecture Notes in Computer Science, pages 75–82. Springer-Verlag, 1994.
O. Delos and J.-J. Quisquater. An identity-based signature scheme with bounded life-span. In Y.G. Desmedt, editor, Advances in Cryptology — CRYPTO’94, volume 839 of Lecture Notes in Computer Science, pages 83–94. Springer-Verlag, 1994.
D. de Waleffe and J.-J. Quisquater. Better login protocols for computer networks. In B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer Security and Industrial Cryptography, volume 741 of Lecture Notes in Computer Science, pages 50–70. Springer-Verlag, 1993.
S. Even, O. Goldreich, and S. Micali. On-line/off-line digital signatures. In G. Brassard, editor, Advances in Cryptology — CRYPTO’89, volume 435 of Lecture Notes in Computer Science, pages 263–275. Springer-Verlag, 1990.
N.M. Haller. The S/KEY one-time password system. In Proc. of the ISOC Symposium on Networks andDistribute dSystems Security, 1994.
L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, 1979.
L. Lamport. Password authentication with insecure communication. Comm. ACM, 24(11):770–772, November 1981.
M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operations. In Proc. of the 3rdA CM Conference on Computer andCommunic ations Security, pages 48–57. ACM Press, 1996.
R.C. Merkle. A digital signature based on a conventional encryption function. In C. Pomerance, editor, Advances in Cryptology — CRYPTO’87, volume 293 of Lecture Notes in Computer Science, pages 369-378. Springer-Verlag, 1988.
R.C. Merkle. A certified digital signature. In G. Brassard, editor, Advances in Cryptology — CRYPTO’89, volume 435 of Lecture Notes in Computer Science, pages 218–238. Springer-Verlag, 1990.
M.O. Rabin. Digitalized signatures. In D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 155–168. Academic Press, 1978.
R. Rivest. The MD5 message digest algorithm. Internet Request for Comments RFC 1321, April 1992. Available at 〈ftp://ds.internic.net/rfc/rfc1321.txt〉.
R.L. Rivest and A. Shamir. PayWord and MicroMint: two simple micropayment schemes. CryptoBytes, 2 (1), 7–11, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Joye, M., Yen, SM. (2002). One-Way Cross-Trees and Their Applications. In: Naccache, D., Paillier, P. (eds) Public Key Cryptography. PKC 2002. Lecture Notes in Computer Science, vol 2274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45664-3_25
Download citation
DOI: https://doi.org/10.1007/3-540-45664-3_25
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43168-8
Online ISBN: 978-3-540-45664-3
eBook Packages: Springer Book Archive