Reducibility Among Protocols
Recently considerable attention has been given to designing provably secure cryptographic protocols. Three basic problems that have been studied are: exchange of secrets, contract signing, and certified mail. Several protocols have been proposed for these problems. These solutions are very diverse in nature: they are secure under different assumptions, have different probabilities of cheating, and require different number of message exchanges. Consequently, there is a need to investigate the underlying relationships between these problems. In this paper, we study reducibilities among these problems, i.e. how a protocol for one problem can be transformed into a protocol for another problem, preserving (roughly) the operating conditions.
KeywordsSignature Scheme Encryption Function Weak Reduction Contract Signing Decryption Function
Unable to display preview. Download preview PDF.
- M. Blum, How to Exchange (Secret) Keys“,Proc. 15th ACM STOC (Apr. 1983), 440–447.Google Scholar
- M. Blum and M. O. Rabin, “Mail Certification by Randomization”, to appear.Google Scholar
- S. Even, O. Goldreich, and A. Lempel, “A Randomized Protocol for Signing Contracts”, Tech. Report #233, The Technion, Israel (Feb. 1982), 11 pp.Google Scholar
- M. O. Rabin, “Transaction Protection by Beacons”, Harvard Center for Research in Computer Technology, TR-29–81 (1981).Google Scholar