Skip to main content

Non-interactive Cryptosystem for Entity Authentication

  • Conference paper
  • First Online:
Information Security (ISW 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1729))

Included in the following conference series:

  • 340 Accesses

Abstract

In case of mobile agent based computing system such as agent-based electronic payment and online electronic publishing of multimedia contents, both precise identification and secure authentication schemes are required for its security. The public-key cryptosystem and the digital signature scheme have been the foundation of overall secure systems. The requirement for providing agent based secure digital contents in electronic commerce is to implement the compatible secure entity authentication scheme. In this paper, existing discrete logarithm based Schnorr like authentication schemes are improved by the analysis of performance and security on the interactive protocols. And ElGamal type authentication schemes are also proposed. Then, they are enhanced with oblivious transfer based non-interactive public key cryptosystem for entity authentication. Proposed non-interactive protocols are applicable to the noninteractive zero knowledge proofs and they can provide compatible performance and safety in distributed commerce applications such as copyright protection system on multimedia contents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stefan Brands, “Off-Line Cash Transfer by Smart Card,” CWI Report CS-R9455, (1994)

    Google Scholar 

  2. Stefan Brands, “Electronic Cash on the Internet,” Symposium of Network and Distributed System Security, (1995)

    Google Scholar 

  3. M. Burrows, M. Abadi, R. Needham, “The Scope of a Logic of Authentication,” Technical report, DEC System Research Center, (1994)

    Google Scholar 

  4. Gustavus J. Simmons, “A Survey of Information Authentication,” Proceedings of the IEEE, Vol. 76, No. 5, (1988) 603–620

    Article  Google Scholar 

  5. W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, (1976) 472–492

    MathSciNet  MATH  Google Scholar 

  6. Whitfield Diffie, “The First Ten Years of Public-Key Cryptography,” Proceedings of the IEEE, Vol. 76, No. 5, (1988) 560–577

    Article  Google Scholar 

  7. C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” Advances in Cryptology, Proceedings of Crypto’89, Springer-Verlag, (1990) 239–252

    Google Scholar 

  8. Tatsuaki Okamoto, “Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes,” Advances in Cryptology, Proceedings of Crypto’92, Springer-Verlag, (1993) 31–53

    Google Scholar 

  9. B. Schneier, Applied Cryptography, 2nd Edition, John Wiley & Sons Press (1996)

    Google Scholar 

  10. Alfred J. Menezed, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press (1996)

    Google Scholar 

  11. A. Fiat and A. Shamir, “How to Prove Yourself: Practical Solution to Identification and Signature Problems,” Advances in Cryptology, Proceedings of CRYPTO’86, Springer-Verlag, (1987) 186–199

    Google Scholar 

  12. U. Feige, A. Fiat, A. Shamir, “Zero Knowledge Proofs of Identity,” Proceedings of the 19th Annual ACM Symposium of Theory of Computing, (1989) 210–217

    Google Scholar 

  13. L. C. Guillou and J. J. Quisquater, “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory,” Advances in Cryptology, Proceedings of Eurocrypt’88, Springer-Verlag, (1989) 123–128

    Google Scholar 

  14. T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. IT-30, No. 4, (1985) 469–472

    Article  MathSciNet  Google Scholar 

  15. R. L. Rivest, A. Shamir and L. Adleman, “A Method Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, (1978) 120–126

    Article  MathSciNet  Google Scholar 

  16. S. Goldwasser, S. Micali, C. Rackoff, “The Knowledge Complexity of Interactive Proofs,” SIAM Journal of Computing, Vol. 18, No. 1, (1989) 186–208

    Article  MathSciNet  Google Scholar 

  17. Kazuo Ohta and Tatsuaki Okamoto, “A Modification of the Fiat-Shamir Scheme,” Advances in Cryptology, Proceedings of Crypto’88, Springer-Verlag, (1989) 232–243

    Google Scholar 

  18. M. Rabin, “How to exchange secrets by oblivious transfer,” Technical Reports TR-81, Harvard Aiken Computation Laboratory, (1981)

    Google Scholar 

  19. Mihir Bellare, Silvio Micali, “Non-Interactive Oblivious Transfer and Applications,” Advances in Cryptology, Proceedings of Crypto 89, Springer-Verlag, (1989)

    Google Scholar 

  20. M. Blum, P. Feldman, s. Micali, “Non-Interactive Zero-Knowledge Proof Systems and Applications,” Proceedings of the 20th Annual ACM Symposium on Theory of Computing, (1988)

    Google Scholar 

  21. Alfredo De Santis, Giovanni Di Crescenzo, Pino Persino, “Randomness-Efficient Non-Interactive Zero Knowledge,” ICALP’97 Conference, (1997)

    Google Scholar 

  22. A. D. Santis, S. Micali, G. Persiano, “Non-Interactive Zero-Knowledge Proof Systems,” Advances in Cryptology, Proceedings of Crypto’87, Vol. 293, (1988)

    Google Scholar 

  23. A. D. Santis, S. Micali, G. Persiano, “Non-Interactive Zero-Knowledge Proof-Systems with Preprocessing,” Advances in Cryptology, Proceedings of Crypto’88, Vol. 403, (1989)

    Google Scholar 

  24. S. Micali, “Fair Cryptosystems,” Technical Reports MIT/LCS/TR-579-b, (1993)

    Google Scholar 

  25. R. Gray, D. Kotz, S. Nog, D. Rus and G. Cybento, “Mobile Agents for Mobile Computing,” Proc. Of 2nd Aizu Int’l Symposium on Parallel Algorithm/Architecture Synthesis(pAs97), Fukushima, Japan, Mar., (1997)

    Google Scholar 

  26. C. G. Harrison, D. M. Chess and A. Kershenbaum, “Mobile Agents: Are they a good idea?” Technical Report, IBM T.J. Watson Research Center, Mar., (1995)

    Google Scholar 

  27. T. Gilmont, J.-D. Legat, J,-J. Quisquater, “Architecture of Security Management Unit for Safe Hosting of Multiple Agents,” Security and Watermarking of Multimedia Contents, Proceedings of SPIE, Vol. 3657, (1999)

    Google Scholar 

  28. E. van Faber, R. Hammelrath, FP Heider, “The Secure Distribution of Digital Contents,” ACSAC’97, (1997) 16–22

    Google Scholar 

  29. N. Memon, PW Wong, “Protecting Digital Media Content,” Communications of the ACM, Vol. 41, No. 7, (1998) 35–43

    Article  Google Scholar 

  30. G. Voyatzis, N. Nikolaidis, I. Pitas, “Digital Watermarking: an Overview,” EUSIPCO’98, (1998) 9–12

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, HW., Kim, JE., Kim, TY. (1999). Non-interactive Cryptosystem for Entity Authentication. In: Information Security. ISW 1999. Lecture Notes in Computer Science, vol 1729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47790-X_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-47790-X_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66695-0

  • Online ISBN: 978-3-540-47790-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics