General public key residue cryptosystems and mental poker protocols

  • Kaoru Kurosawa
  • Yutaka Katayama
  • Wakaha Ogata
  • Shigeo Tsujii
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 473)

Abstract

This paper presents a general method how to construct public key cryptosystems based on the r-th residue problem. Based on the proposed method, we present the first mental poker protocol which can shuffle any set of cards. Its fault tolerant version is given, too. An efficient zero knowledge interactive proof system for quadratic non-residuosity is also shown.

References

  1. [BY]
    Benaloh and Yung: “Distributing the power of a government to enhance the privacy of voters”, Proc. 5th Annual Symp. on pronciples of distributed computing, ACM, pp.52–62 (1985)Google Scholar
  2. [C]
    Crepeau: “A zero knowledge poker protocol that achieves confidentiality of players’ strategy, or how to achieve an electronic poker face”, CRYPTO’86, pp.239–247 (1986)Google Scholar
  3. [CF]
    Cohen and Fischer: “A robust and verifiable cryptographically secure election scheme”, Proc. 26th FOCS, pp.372–382 (1985)Google Scholar
  4. [GM]
    Goldwasser and Micali: “Probabilistic encription and how to play mental poker, keeping secret all partial information”, 14th STOC, pp.365–377 (1982)Google Scholar
  5. [GMR]
    Goldwasser, Micali and Rackoff: “The knowledge complexity of interactive proof systems”, SIAM J. on computing, vol.18, No.1, pp.186–208 (1989)MathSciNetMATHCrossRefGoogle Scholar
  6. [HW]
    Hardy and Wright: “An introduction to the theory and numbers”, 5th ed., Oxford Univ. Press (1979)Google Scholar
  7. [K]
    Koblitz: “A course in number theory and cryptography”, Springer-Verlag (1987)Google Scholar
  8. [MUS]
    Miyama, Uyematsu and Sakaniwa: “A mental poker protocol without later verifications”, (in Japanese) (1987)Google Scholar
  9. [P]
    Peterson: “Error correcting codes”, MIT Press (1961)Google Scholar
  10. [ZMI]
    Zheng, Matsumoto and Imai: “Residuosity problem and its application to cryptography”, Trans, IEICE, vol.E71, No.8, pp.759–767 (1988)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • Kaoru Kurosawa
    • 1
  • Yutaka Katayama
    • 1
  • Wakaha Ogata
    • 1
  • Shigeo Tsujii
    • 1
  1. 1.Department of Electrical and Electronic Engineering Faculty of EngineeringTokyo Institute of TechnologyTokyoJapan

Personalised recommendations