Abstract
A practical non-interactive scheme is proposed to simultaneously solve several open problems in group oriented cryptography. The sender of the information is allowed to determine the encryption/decryption keys as well as the information destination without any coordination with the receiving group. The encrypted message is broadcasted to the receiving group and the receivers may authenticate themselves for legitimacy of the information directly from the ciphertext. The security of the scheme can be shown to be equivalent to the difficulty of solving the discrete logarithm problem.
Chapter PDF
Similar content being viewed by others
Key Words
[References]
D. E. R. Denning. Cryptography and Data Security. Addison — Wesley, Reading, Mass., 1982.
W. Diffie and M. E. Hellman. “New directions in cryptography”. IEEE Trans. Inform. Theory, IT-22(6):644–654, November 1976.
Y. Desmedt. “Society and group oriented cryptography: a new concept”. In C. Pomerance, editor, Advances in Cryptology, proc. of Crypto’87 (Lecture Notes in Computer Science 293), pages 120–127. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16–20.
Y. Desmedt and Y. Frankel, “Threshold Cryptosystems”. presented at Crypto’89. Santa Barbara, California, U.S.A. Aug. 20–24.
Y. Frankel. “Practical Protocol for Large Group Oriented Networks”. Presented at Eurocrypt’89, Houthalen, Belgium, to appear in Advances in Cryptology. Proc. of Eurocrypt’89 (Lecture Notes in Computer Science), Springer-Verlag, April 1989.
O. Goldreich, S. Micali, and A. Wigderson. “How to play any mental game”. In Proceedings of the Nineteenth ACM symp. Theory of Computing, STOC, pages 218–239, May 25–27, 1987.
T. Hwang, “On the Secure Communications of Group Oriented Socienties”, 1990 IEEE International Symposium on Info. Theory.
C. S. Laih, L. Harn, and J. Y. Lee, “A new threshold scheme and its application on designing the conference key distribution cryptosystem.”, Info. processing letters, North-Holland Vol. 32, No. 3, 24 Aug. 1989.
G. p. Purdy, “A High Security Log-in Procedure”, Commun. ACM vol. 17(8), pp. 442–445 Aug. 1974.
A. Shamir. How to share a secret. Commun. ACM, 22:612–613, November 1979.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, T. (1991). Cryptosystem for Group Oriented Cryptography. In: Damgård, I.B. (eds) Advances in Cryptology — EUROCRYPT ’90. EUROCRYPT 1990. Lecture Notes in Computer Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46877-3_32
Download citation
DOI: https://doi.org/10.1007/3-540-46877-3_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53587-4
Online ISBN: 978-3-540-46877-6
eBook Packages: Springer Book Archive