Abstract
[Sim84] introduced the concept of subliminal channel in the context of signature systems. [Des88b] presented a solution against subliminal channels and extended in [Des88a] the solution to abuse-free coin-flipping, abuse-free generation of public keys, and abuse-free zero-knowledge. In this paper we demonstrate that a whole family of systems (generalized Arthur-Merlin games) can be made abuse-free, avoiding the exhaustive approach of [Des88a]. We will hereto formalize the concept of abuse.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
L. Babai. Trading group theory for randomness. In Proceedings of the seventeenth ACM Symp. Theory of Computing, STOC, pp. 421–429, May 6–8, 1985.
M. V. D. Burmester and Y. G. Desmedt, June 1989. Text in preparation.
M. Blum, P. Feldman, and S. Micali. Non-interactive zero-knowledge and its applications. In Proceedings of the twentieth ACM Symp. Theory of Computing, STOC, pp. 103–112, May 2–4, 1988.
M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson. Multi-prover interactive proofs: How to remove intractability assumptions. In Proceedings of the twentieth ACM Symp. Theory of Computing, STOC, pp. 113–131, May 2–4, 1988.
D. Chaum, J.-H. Evertse, J. van de Graaf, and R. Peralta. Demonstrating possession of a discrete logarithm without revealing it. In A. Odlyzko, editor, Advances in Cryptology. Proc. Crypto’86 (Lecture Notes in Computer Science 263), pp. 200–212 Springer-Verlag, 1987. Santa Barbara, California, U.S.A., August 11–15.
Y. Desmedt. Abuses in cryptography and how to fight them. Presented at Crypto’88, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto’88 (Lecture Notes in Computer Science), Springer-Verlag, August 1988.
Y. Desmedt. Subliminal-free authentication and signature. In C. G. Günther, editor, Advances in Cryptology, Proc. of Eurocrypt’88 (Lecture Notes in Computer Science 330), pp. 23–33. Springer-Verlag, May 1988. Davos, Switzerland.
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. Siam J. Comput., 17(2), pp. 281–308, April 1988.
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. Siam J. Comput., 18(1), pp. 186–208, February 1989.
E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. The BELL System Technical Journal, 53(3), pp. 405–424, March 1974.
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In The Computer Society of IEEE, 27th Annual Symp. on Foundations of Computer Science (FOCS), pp. 174–187. IEEE Computer Society Press, 1986. Toronto, Ontario, Canada, October 27–29,1986.
T. C. Jones and J. Seberry. Authentication without secrecy. ARS Combinatoria, 21(A), pp. 115–121, May 1986.
C. E. Shannon. Communication theory of secrecy systems. Bell System Techn. Jour., 28, pp. 656–715, October 1949.
G. J. Simmons. The prisoners’ problem and the subliminal channel. In D. Chaum, editor, Advances in Cryptology. Proc. of Crypto 83, pp. 51–67. Plenum Press N.Y., 1984. Santa Barbara, California, August 1983.
G. J. Simmons. The subliminal channel and digital signatures. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology. Proc. of Eurocrypt 84 (Lecture Notes in Computer Science 209), pp. 364–378. Springer-Verlag, Berlin, 1985. Paris, France, April 9–11, 1984.
G. J. Simmons. The secure subliminal channel (?). In H. C. Williams, editor, Advances in Cryptology. Proc. of Crypto 85 (Lecture Notes in Computer Science 218), pp. 33–41. Springer-Verlag, 1986. Santa Barbara, California, August 18–22, 1985.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y.G. (1990). Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_2
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_2
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive