A new paradigm for public key identification

نویسنده

  • Jacques Stern
چکیده

The present article investigates the possibility of designing zero-knowledge identi-cation schemes based on hard problems from coding theory. Zero-knowledge proofs were introduced in 1985, in a paper by Goldwasser, Micali and Rackoo ((16]). Their practical signiicance was soon demonstrated in the work of Fiat and Shamir ((11]), who turned zero-knowledge proofs of quadratic residuosity into eecient means of establishing user identities. In the present paper, we propose a new identiication scheme, based on error-correcting codes, which is zero-knowledge and seems of practical value. Furthermore, we describe several variants, including one which has an identity based character. The security of our schemes depends on the hardness of nding a word of given syndrome and prescribed (small) weight with respect to some randomly generated binary linear error-correcting code. This is, of course, not the rst attempt to design a cryptographic scheme using tools from coding theory. The diierence is that identiication protocols do not follow the public key paradigm based on trap-door functions and described in the seminal Diie-Hellman paper ((8]). Rather, they only require one-way functions, which opens the way to using, in a rather direct manner, simple combinatorial problems of the kind provided by coding theory. The resulting schemes compare favourably to their number-theoretic analogues. 0 Introduction Modern cryptography is concerned with algorithms and schemes which ensure conndentiality, integrity and proof of origin for digital communications. In conventional cryptosystems, these various functionalities are provided in a setting where the transmitter and the receiver share a common key, whose secrecy is requested for proper operation. A major breakthrough took place in 1976 with the appearance of public-key cryptography ((8]). In their paper, Diie and Hellman proposed a new concept, allowing the use of two matching keys, one for encryption and a diierent one for decryption. The main novel character of the concept is that the encryption key need not be kept secret. Shortly afterwards, Rivest, Shamir and Adleman invented the celebrated RSA algorithm ((29]). This algorithm is a public key system making heavy use of operations modulo a large integer n obtained by multiplying together two prime numbers and whose security is related to diiculty of factoring n. Since then, nearly all new cryptographic schemes have been based on hard problems from number 1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification in Cyberspace as a Main Challenge of e-Government (A Legal Approach to e-Identity Management System)

The penetration and growth of the Internet, as a key technology of the 21st century, caused to some major changes in all individual and social aspects of human life. Some of these changes, which associated with the evolution and changes in the concepts, including legal and political ones, have become a challenge. Identity as a legal and Government as a political concepts are in those fields whi...

متن کامل

Rethinking the architecture of public library spaces in order to redefine a new paradigm

Purpose: The present study aimed to briefly review the current status of the required spaces for the public libraries in the country and identify and redefine the architectural needs of these spaces to achieve a new pattern for contemporary libraries. Method: It is a qualitative research based on grounded theory. The data is collected using library and field methods, analytical analyses, and i...

متن کامل

A new paradigm of chosen ciphertext secure public key encryption scheme

For all current adaptive chosen ciphertext(CCA) secure public key encryption schemes in standard model there are two operations in the decryption algorithm, “validity check” and decryption. The decryption algorithm returns the corresponding plaintext if the ciphertext is valid otherwise it returns a rejection symbol ⊥. We call this paradigm “invalid ciphertext rejection”. However the “validity ...

متن کامل

Organizational Black Hole Theory

There are issues in organizations that require new theoretical formulation. Hence, metaphorical theorizing is used in the study of organizations to interpret them and understand their complexities. In this method, the organization is likened to an entity and one of the key features of that entity is generalized to the organization. It should be borne in mind that most organizational theories ar...

متن کامل

Implicit and Explicit Certificates-Based Encryption Scheme

Certificate-based encryption (CBE) combines traditional public-key encryption and certificateless encryption. However, it does suffer to the Denial of Decryption (DoD) attack called by Liu and Au. To capture this attack, they introduced a new paradigm called self-generated-certificate public key cryptography. In this paper we show that the problem of DoD attack can be solved with a new implicit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Trans. Information Theory

دوره 42  شماره 

صفحات  -

تاریخ انتشار 1996