Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

International Conference on the Theory and Applications of Cryptographic Techniques

EUROCRYPT 1998: Advances in Cryptology — EUROCRYPT'98 pp 127–144Cite as

  1. Home
  2. Advances in Cryptology — EUROCRYPT'98
  3. Conference paper
Divertible protocols and atomic proxy cryptography

Divertible protocols and atomic proxy cryptography

  • Matt Blaze1,
  • Gerrit Bleumer1 &
  • Martin Strauss1 
  • Conference paper
  • First Online: 01 January 2006
  • 4691 Accesses

  • 692 Citations

  • 2 Altmetric

Part of the Lecture Notes in Computer Science book series (LNCS,volume 1403)

Abstract

First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90]). We give a definition of protocol divertibility that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs. Other important examples falling under the new definition are blind signature protocols. We propose a sufficiency criterion for divertibility that is satisfied by many existing protocols and which, surprisingly, generalizes to cover several protocols not normally associated with divertibility (e.g., Diffie-Hellman key exchange). Next, we introduce atomic proxy cryptography, in which an atomic proxy function, in conjunction with a public proxy key, converts ciphertexts (messages or signatures) for one key into ciphertexts for another. Proxy keys, once generated, may be made public and proxy functions applied in untrusted environments. We present atomic proxy functions for discrete-log-based encryption, identification, and signature schemes. It is not clear whether atomic proxy functions exist in general for all public-key cryptosystems. Finally, we discuss the relationship between divertibility and proxy cryptography.

Keywords

  • Signature Scheme
  • Signature Proxy
  • Proxy Signature Scheme
  • Communication Tape
  • Interactive Turing Machine

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Matt Blaze, Martin Strauss. Atomic Proxy Cryptography. AT&T Labs-Research TR98.5.1 http://www.reseeurch.att.com/library/trs

  2. Gerrit Bleumer. On Protocol Divertibility. AT&T Labs-Research TR97.34.2 http://www.research.att.com/library/trs

  3. Mike V. D. Burmester, Yvo Desmedt. All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions. Eurocrypt '90 LNCS 473, Springer-Verlag 1991, 1–10.

    Google Scholar 

  4. David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf. An improved protocol for demonstrating possession of discrete logarithms and some generalizations. Eurocrypt '87. LNCS 304, Springer-Verlag 1988, 127–141.

    Google Scholar 

  5. Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler. Blind Signatures Based on the Discrete Logarithm Problem. Eurocrypt '94. LNCS 950, Springer-Verlag 1995, 428–432.

    Google Scholar 

  6. John M. DeLaurentis. A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm. Cryptologia 8/3 (1984) 253–259.

    MathSciNet  Google Scholar 

  7. Whitfield Diffie, Martin E. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory. 22/6 (1976) 644–654.

    CrossRef  MathSciNet  Google Scholar 

  8. Taher ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. 31/4 (1985) 469–472.

    CrossRef  MathSciNet  Google Scholar 

  9. Uriel Feige, Arnos Fiat, Adi Shamir. Zero-Knowledge Proofs of Identity. Journal of Cryptology 1/2 (1988) 77–94.

    CrossRef  MathSciNet  Google Scholar 

  10. Amos Fiat, Adi Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Crypto '86. LNCS 263, Springer-Verlag 1987, 186–194.

    Google Scholar 

  11. Shafi Goldwasser, Silvio Micali, Charles Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Computing. 18/1 (1989) 186–207.

    CrossRef  MathSciNet  Google Scholar 

  12. Patrick Horster, Markus Michels, Holger Petersen. Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. Asiacrypt '94. LNCS 917, Springer-Verlag 1995, 224–237.

    Google Scholar 

  13. Eric Hughes. An encrypted key transmission protocol. Crypto '94 Rump Session presentation, August 1994.

    Google Scholar 

  14. Toshija Itoh, Kouichi Sakurai, Hiroki Shizuya. Any Language in IP has a Divertible ZKIP. AsiaCrypt '91. Springer-Verlag 1993, 382–396.

    Google Scholar 

  15. Masahiro Mambo, Eiji Okamoto. Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. Fund. Electronics Communications and Comp Sci. E80-A/1 (1997) 54–63.

    Google Scholar 

  16. Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto. Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fund. of Electronic Communications and Comp Sci. E79-A/9 (1996) 1338–1354.

    Google Scholar 

  17. NIST. A proposed federal information processing standard for digital signature standard (DSS). Draft Tech. Rep. FIPS PUB XXX, August 1991. Standards Publication (FIPS

    Google Scholar 

  18. Tatsuaki Okamoto, Kazuo Ohta. Divertible zero-knowledge interactive proofs and commutative random self-reducibility. Eurocrypt '89 LNCS 434, Springer-Verlag 1990, 134–149.

    Google Scholar 

  19. Ronald L. Rivest, Adi Shamir, Leonhard Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. CACM 21/2 (1978) 120–126, reprinted: 26/1 (1983) 96–99.

    MathSciNet  Google Scholar 

  20. Gustavus J. Simmons. A ”Weak” Privacy Protocol Using the RSA Crypto Algorithm. Cryptologia 7/2 (1983) 180–182.

    Google Scholar 

  21. Gustavus J. Simmons. The Prisoners' Problem and the Subliminal Channel. Crypto '83. Plenum Press, New York 1984, 51–67.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. AT&T Labs - Research, Florham Park, 07932, NJ, USA

    Matt Blaze, Gerrit Bleumer & Martin Strauss

Authors
  1. Matt Blaze
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Gerrit Bleumer
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Martin Strauss
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

    Rights and permissions

    Reprints and Permissions

    Copyright information

    © 1998 Springer-Verlag Berlin Heidelberg

    About this paper

    Cite this paper

    Blaze, M., Bleumer, G., Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (eds) Advances in Cryptology — EUROCRYPT'98. EUROCRYPT 1998. Lecture Notes in Computer Science, vol 1403. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0054122

    Download citation

    • .RIS
    • .ENW
    • .BIB
    • DOI: https://doi.org/10.1007/BFb0054122

    • Published: 25 May 2006

    • Publisher Name: Springer, Berlin, Heidelberg

    • Print ISBN: 978-3-540-64518-4

    • Online ISBN: 978-3-540-69795-4

    • eBook Packages: Springer Book Archive

    Share this paper

    Anyone you share the following link with will be able to read this content:

    Sorry, a shareable link is not currently available for this article.

    Provided by the Springer Nature SharedIt content-sharing initiative

    search

    Navigation

    • Find a journal
    • Publish with us

    Discover content

    • Journals A-Z
    • Books A-Z

    Publish with us

    • Publish your research
    • Open access publishing

    Products and services

    • Our products
    • Librarians
    • Societies
    • Partners and advertisers

    Our imprints

    • Springer
    • Nature Portfolio
    • BMC
    • Palgrave Macmillan
    • Apress
    • Your US state privacy rights
    • Accessibility statement
    • Terms and conditions
    • Privacy policy
    • Help and support

    18.207.160.97

    Not affiliated

    Springer Nature

    © 2023 Springer Nature