Click Here! |
|
|
To access the contents, click the chapter and section titles.
Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
Unfortunately, a pair of dishonest parties can cheat. Alice and Carol, working together, can easily find out what secret Bob is getting: If they know the FBI of Cb and Bobs encryption algorithm, they can find b such that Cb has the right FBI. And Bob and Carol, working together, can easily get all the secrets from Alice. If you assume honest parties,theres an easier protocol [389].
If the parties may be dishonest, Bob can prove in zero-knowledge that he knows some r such that C'=Cbre mod n and keep b secret until Alice gives him P' in step (3) [246]. 23.10 Fair and Failsafe CryptosystemsFair Diffie-Hellman Fair cryptosystems are a way to do key escrowing in software (see Section 4.14). This example is from Silvio Micali [1084,1085]. It is patented [1086,1087]. In the basic Diffie-Hellman scheme, a group of users share a prime, p, and a generator, g. Alices private key is s, and her public key is t =gs mod p. Heres how to make Diffie-Hellman fair (this example uses five trustees).
At this point, the KDC knows that the trustees each have a valid piece, and that they can reconstruct the private key if required. However, neither the KDC nor any four of the trustees working together can reconstruct Alices private key. Micalis papers [1084,1085] also contain a procedure for making RSA fair and for combining a threshold scheme with the fair cryptosystem, so that m out of n trustees can reconstruct the private key. Failsafe Diffie-Hellman Like the previous protocol, a group of users share a prime, p, and a generator, g. Alices private key is s, and her public key is t =gs mod p.
The trustees can reconstruct A. Since the KDC knows B, this is enough to reconstruct s. And Alice cannot make use of any subliminal channels to send unauthorized information. This protocol, discussed in [946,833] is being patented. 23.11 Zero-Knowledge Proofs of KnowledgeZero-Knowledge Proof of a Discrete Logarithm Peggy wants to prove to Victor that she knows an x that satisfies
where p is a prime, and x is a random number relatively prime to p - 1. The numbers A, B, and p are public, and x is secret. Heres how Peggy can prove she knows x without revealing it (see Section 5.1) [338,337].
Peggys probability of successfully cheating is 2-t. Zero-Knowledge Proof of the Ability to Break RSA Alice knows Carols private key. Maybe she has broken RSA; maybe she has broken into Carols house and stolen the key. Alice wants to convince Bob that she knows Carols key. However, she doesnt want to tell Bob the key or even decrypt one of Carols messages for Bob. Heres a zero-knowledge protocol by which Alice convinces Bob that she knows Carols private key [888].
|
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-1999 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.
|