Eecient Accumulators without Trapdoor Extended Abstract

نویسنده

  • Tomas Sander
چکیده

In 1994 Benaloh and de Mare introduced the notion of one way accumulators that allow to construct eecient protocols for proving membership in a list and related problems like time stamping and authentication. As required by Benaloh et al. unlike in signature based protocols no central trusted authority is (should be) needed. Accumula-tor based protocols do further improve on hash tree based protocols for proving membership in a list as veriication and storage requirements are independent of the number of items in the list. Benaloh's et al. accumu-lator construction was based on exponentiation modulo a RSA modulus N = PQ. As already noted by Benaloh et al. the party (or parties) who generated the needed RSA modulus N during system set up knows a factorization of N. This knowledge allows this party to completely bypass the security of accumulator based protocols. For example a time stamping agency could forge time stamps for arbitrary documents. Thus these parties need to be trusted in (at least) two ways. First that they do not abuse their knowledge of the trapdoor and secondly to have had adequate security in place during system set up, which prevented outside attackers from getting hold of P and Q. In this paper we describe a way to construct (generalized) RSA moduli of factorization unknown to anybody. This yields (theoretically) eecient accumulators such that \nobody knows a trapdoor" and the two above mentioned trust requirements in the parties who set up the system can be removed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes

Suppose that we wish to encrypt long messages with small overhead by a public key encryption scheme which is secure against adaptive chosen ciphertext attack (IND-CCA2). Then the previous schemes require either a large size one-way trapdoor permutation (OAEP) or both a large size symmetric encryption scheme and a small size asymmetric encryption scheme (hybrid encryption). In this paper, we sho...

متن کامل

Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation

We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constructing an identitybased (ID-based) ring signature scheme with constant-size signatures and its interactive counterpart, and providing membership revocation to group signature, traceable signature and identity escrow sc...

متن کامل

Security of Blind Digital Signatures (Extended Abstract)

Blind digital signatures were introduced by Chaum. In this paper, we show how security and blindness properties for blind digital signatures, can be simultaneously de ned and satis ed, assuming an arbitrary one-way trapdoor permutation family. Thus, this paper presents the rst complexity-based proof of security for blind signatures.

متن کامل

Eecient Broadcast Time-stamping (extended Abstract) Eecient Broadcast Time-stamping (extended Abstract)

Even using an authenticated synchronous broadcast model, the task of unforgeably time-stamping digital documents still presents some problems. It is simply not practical to assume that all participants will record and store everyone else's documents so that creation times can be veri ed. This paper presents a time and space e cient method for accumulation of time-stamped documents. Whenever a q...

متن کامل

Black - Box Constructions for Secure Computation ∗ ( extended abstract )

It is well known that the secure computation of non-trivial functionalities in the setting of no honest majority requires computational assumptions. We study the way such computational assumptions are used. Specifically, we ask whether the secure protocol can use the underlying primitive (e.g., one-way trapdoor permutation) in a black-box way, or must it be nonblack-box (by referring to the cod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999