Abstract
An unconditionally secure non-repudiation scheme is optimised to maximise the number of messages that may be sent with a given amount of shared key data. By dropping the unconditional security property a related scheme with less memory storage requirements is constructed. In relation to the options for providing non repudiation some discussion of the complexity of the cryptanalysis of public and private key cryptosystems is provided.
Preview
Unable to display preview. Download preview PDF.
References
E. Bach, Intractable Problems in Number Theory, Advances in Cryptology — CRYPTO '88, proceedings, Springer-Verlag 1989, pp. 77–93.
J. Bierbrauer, T. Johansson, G. Kabatianskii and B. Smeets, On families of Hash functions via Geometric Codes and Concatenation, Advances in Cryptology — CRYPTO '93, proceedings, Springer-Verlag 1994, pp. 331–342.
R. Blom, An Optimal class of Symmetric Key Generation Systems, Advances in Cryptology — EUROCRYPT '84, proceedings, Springer-Verlag 1985, pp. 335–338.
G. Brassard. A note on the complexity of cryptography. IEEE Transactions on Information Theory, 25, 1979, pp. 232–233.
Y. Desmedt and M. Yung, Arbitrated Unconditionally Secure Authentication Can Be Unconditionally Protected against Arbiters Attacks, Advances in Cryptology — CRYPTO '90, proceedings, Springer-Verlag 1991, pp. 177–188.
S. Even and Y. Yacobi, Cryptocomplexity and NP-completeness. In Proc. of 8th Colloq. on Automata, Languages, and Programming, Lecture Notes in Computer Science, Springer-Verlag 1980, pp. 195–207.
M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freedman, San Francisco, 1979.
T. Johansson and B. Smeets, On A2-codes Including Arbiters Attacks, Advances in Cryptology — EUROCRYPT '94, proceedings (rump session), Springer-Verlag 1995.
T. Johansson, On the construction of Perfect Authentication Codes that permit Arbitration, Advances in Cryptology — CRYPTO '93, proceedings, Springer-Verlag 1993, pp 341–354.
H. J. Knobloch, A Smart Card Implementation of the Fiat-Shamir Identification Scheme, Advances in Cryptology — EUROCRYPT '88, proceedings, Springer-Verlag 1989, pp. 87–96.
K. Kurosawa, New bounds on Authentication Codes with Arbitration, Advances in Cryptology — CRYPTO '94, proceedings, Springer-Verlag 1994, pp 140–149.
A. L. Selman, Complexity Issues in Cryptography, Proceedings of Symposia in Applied Mathematics, 38, 1989, pp. 92–107.
B. Schneier, Applied Cryptography, 2nd Edition, John Wiley and Sons, ISBN 0-471-12845-7, 1995.
G. J. Simmons, Message Authentication with Arbitration of Transmitter/Receiver disputes, Advances in Cryptology — EUROCRYPT '87, proceedings, Springer-Verlag 1988, pp. 151–165.
G. J. Simmons, A Cartesian Product Construction for Unconditionally Secure Authentication Codes that permit Arbitration, Journal of Cryptology, 2(2), pp. 77–104, 1990.
D. Stinson, Universal Hashing and Authentication codes, Advances in Cryptology — CRYPTO '91, proceedings, Springer-Verlag 1992, pp 74–85.
R. Taylor, Factoring and Cryptography, Telecom Australia, Research Laboratories Report 8048, July 1991.
R. Taylor, Discrete Logs, Factoring and Cryptography, Unpublished work completed in 1991.
R. Taylor, Near Optimal Unconditionally Secure Authentication, Advances in Cryptology — EUROCRYPT '94, proceedings, Springer-Verlag 1995, pp. 244–253.
M. N. Wegman and J. L. Carter, New Hash Functions and their use in Authentication and set equality, Journal of Computer and System Sciences 22, 1981, pp. 265–279.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Taylor, R. (1996). Non-repudiation without public-key. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023284
Download citation
DOI: https://doi.org/10.1007/BFb0023284
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61991-8
Online ISBN: 978-3-540-49583-3
eBook Packages: Springer Book Archive