Skip to main content

On Quorum Controlled Asymmetric Proxy Re-encryption

  • Conference paper
  • First Online:
Public Key Cryptography (PKC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1560))

Included in the following conference series:

Abstract

We present a scheme for quorum controlled asymmetric proxy re-encryption, with uses ranging from efficient key distribution for pay-tv to email applications. We prove that the scheme, which is based on El-Gamal encryption, leaks no information as long as there is no dishonest quorum of proxy servers. Of potential independent interest is a method providing publicly verifiable translation certificates, proving that the input and output encryptions correspond to the same plaintext message, without leaking any information about the plaintext to either the verifier or a subset of the servers of the prover. The size of the certificate is small, and independent of the number of prover servers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare, P. Rogaway, “Random Oracles are Practical: a paradigm for designing eficient protocols,” 1st ACM Conference on Computer and Communications Security, pp. 62–73, 1993.

    Google Scholar 

  2. M. Blaze, G. Bleumer, M. Strauss, “Divertible Protocols and Atomic Proxy Cryptography,” Eurocrypt’ 98, pp. 127–144

    Google Scholar 

  3. D. Chaum, H. VanAntwerpen, “Undeniable Signatures,” Crypto’ 89, pp. 212–216

    Google Scholar 

  4. D. Chaum, “Zero-Knowledge Undeniable Signatures,” Eurocrypt’ 90, pp. 458–464

    Google Scholar 

  5. A. DeSantis, Y. Desmedt, Y. Frankel, and M. Yung, “How to Share a Function Securely,” STOC’ 94, pp. 522–533

    Google Scholar 

  6. T. ElGamal “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Crypto’ 84, pp. 10–18

    Google Scholar 

  7. Y. Frankel, P. Gemmell, P. MacKenzie, M. Yung, “Proactive RSA,” Proc. of CRYPTO’ 97, pp. 440–454

    Google Scholar 

  8. S. Goldwasser and S. Micali, “Probabilistic Encryption,” J. Comp. Sys. Sci. 28, pp 270–299, 1984.

    Article  MATH  MathSciNet  Google Scholar 

  9. A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, “Proactive Secret Sharing, or How to Cope with Perpetual Leakage,” Crypto’ 95, pp. 339–352

    Google Scholar 

  10. A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, “Proactive Public Key and Signature Systems,” Proceedings of the 4th ACM Conference on Computer and Communications Security, 1997, pp. 100–110

    Google Scholar 

  11. T. P. Pedersen. A threshold cryptosystem without a trusted party. In D. W. Davies, editor, Advances in Cryptology — EUROCRYPT’ 91, volume 547 of Lecture Notes in Computer Science, pp. 522–526. Springer-Verlag, 1991.

    Google Scholar 

  12. T. P. Pedersen. “Non-interactive and information-theoretic secure verifiable secret sharing,” Crypto’ 91, pp. 129–140

    Google Scholar 

  13. D. Pointcheval, J. Stern, “Security Proofs for Signature Schemes,” Eurocrypt’ 96, pp. 387–398

    Google Scholar 

  14. C. P. Schnorr, “Efficient Signature Generation for Smart Cards,” Advances in Cryptology-Proceedings of Crypto’ 89, pp. 239–252

    Google Scholar 

  15. A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, 1979, pp. 612–613

    Article  MATH  MathSciNet  Google Scholar 

  16. D. Tygar, B. Yee, “Strongbox: A System for Self Securing Programs,” CMU Computer Science: 25th Anniversary Commemorative, Addison-Wesley, 1991

    Google Scholar 

  17. B. Yee, D. Tygar, “Secure Coprocessors in Electronic Commerce Applications,” Proceedings of the First USENIX Workshop on Electronic Commerce, New York, New York, July, 1995

    Google Scholar 

  18. B. Yee, “Using Secure Coprocessors,” Ph.D. Thesis, Carnegie Mellon University, CMU-CS-94-149, 1994

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jakobsson, M. (1999). On Quorum Controlled Asymmetric Proxy Re-encryption. In: Public Key Cryptography. PKC 1999. Lecture Notes in Computer Science, vol 1560. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49162-7_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-49162-7_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65644-9

  • Online ISBN: 978-3-540-49162-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics