Implementing an Electronic Notary Public

  • Leonard M. Adleman
Conference paper


Many communication security problems admit both “physical” and “mathematical” solutions. For example sending a message from A to B without exposing it to C, can be accomplished physically by means of secure courier, or mathematically by means of encryption. With the advent of public key cryptography, many problems originally believed to be solvable only by physical means have been shown to have mathematical solutions (e.g. key distribution [DB], secret sharing [S], coin flipping [B], mental poker playing [SRA]), In this paper we describe a mathematical solution to a communication security problem, which arose in connection with the Nuclear Test Ban Treaty, and for which only physical solutions were known, The problem concerns the implementation of an electronic notary public - a device which can certify information for a group of mutually distrusting parties - among which may be builder of the device.


Trojan Horse Notary Public Mathematical Solution Geiger Counter Intended Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [B]
    Blum, R., “How to Exchange (Secret Keys)” ERL Technical Memo UCB/ERL M81/90.Google Scholar
  2. [DH]
    Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE Trans. Inform. Theory, Vol. IT-22, Nov. 1976.Google Scholar
  3. [M]
    Miller, G.L., “Riemann’s Hypothesis and Tests for Primality,” Proc. Seventh Annual ACM Symp. on the Theory of Computing. Albuquerque, New Mexico, May 1975, pp. 234–239; extended vers. available as Res. Rep. CS-75–27, Dept. of Computer Science, University of Waterloo, Waterloo, Ont., Canada, Oct. 1975.Google Scholar
  4. [RSA]
    Rivest, R.L., Shamir, A. and Adleman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” CACM 21, pp. 120–126, February 1978.CrossRefGoogle Scholar
  5. [S]
    Shamir, A., “How to Share a Secret,” CACM 22, Number 11, p. 612, November 1979.CrossRefGoogle Scholar
  6. [SRA]
    Shamir, A. Rivest, R. and Adleman, L.M., “Mental Poker,” MIT/LCS/TM-125.Google Scholar

Copyright information

© Springer Science+Business Media New York 1983

Authors and Affiliations

  • Leonard M. Adleman
    • 1
  1. 1.Massachusetts Institute of TechnologyUniversity of Southern CaliforniaUSA

Personalised recommendations