Skip to main content

Protection of data and delegated keys in digital distribution

  • Security Protocols And Key Management
  • Conference paper
  • First Online:
  • 137 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Abstract

A cryptography is quite effective in protecting digital information from unauthorized access. But if a receiver of information is determined after the encryption of the information, e.g. a posted encrypted news is withdrawn by an arbitrary user in open networks, we need an additional mechanism for converting the encrypted information into a form accessible only to an admissible user. Even though such a transformation is done by the consecutive execution of decryption of a ciphertext and re-encryption of a recovered plaintext, an intermediary plaintext may be stolen during the re-encryption. In this paper we examine secure digital distribution systems, information storage system and information provider system, in which encrypted information is directly transformed into a ciphertext of an admissible user. We show that the technique of a proxy cryptosystem is useful for establishing these distribution systems. Proposed protocols can be constructed base on the ElGamal cryptosystem or the RSA cryptosystem. Meanwhile, a blind decryption protocol provides privacy protection with respect to the selection of a ciphertext to be decrypted. In terms of digital distribution it also provides a secure information delivery. An information provider system using a blind decryption protocol possesses a problem such that a decrypting person computes exponentiation for a message freely selected by a requesting person. For such an oracle problem, a solution is known with use of a transformable signature. In this paper we show another measure prohibiting the abuse of the blind decryption protocol.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. I. Damgård: “Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks,” Lecture Notes in Computer Science 576, Advances in Cryptology-Crypto '91, Springer-Verlag, pp.445–456 (1992).

    Google Scholar 

  2. D. Chaum: “Security without Identification: Transaction System to make Big Brother Obsolete,” Communications of the ACM, Vol. 28, No.10, pp. 1030–1044 (Oct. 1985).

    Article  Google Scholar 

  3. T. ElGamal: “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithm,” IEEE Trans. on Information Theory, Vol. IT-31, No.4, pp. 469–472 (Jul. 1985).

    Article  Google Scholar 

  4. N. Koblitz: A Course in Number Theory and Cryptography, GTM 114, Springer-Verlag (1987).

    Google Scholar 

  5. M. Mambo and E. Okamoto: “Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts,” IEICE Transactions on Fundamentals, Vol. E80-A, No.1, pp. 54–63 (Jan. 1997).

    Google Scholar 

  6. M. Mambo, K. Sakurai and E. Okamoto: “How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem,” Lecture Notes in Computer Science 1163, Advances in Cryptology-Asiacrypt '96, Springer-Verlag, pp.322–333 (1996).

    Google Scholar 

  7. S. Micali: “Fair Public-Key Cryptosystems,” Lecture Notes in Computer Science 740, Advances in Cryptology-Crypto '92, Springer-Verlag, pp.113–138 (1993).

    Google Scholar 

  8. R. Mori: “Superdistribution: The Concept and the Architecture,” The Proc. of The 1990 Symposium on Cryptography and Information Security, SCIS90-6A (Jan. 1990).

    Google Scholar 

  9. R. M. Needham and M. D. Schroeder: “Using Encryption for Authentication in Large Networks of Computers,” Communications of the ACM, Vol. 21, No.12, pp. 993–999 (Dec. 1978).

    Article  Google Scholar 

  10. B. C. Neuman: “Proxy-Based Authorization and Accounting for Distributed Systems,” Proc. of the 13th International Conference on Distributed Computing Systems, pp.283–291 (May 1993).

    Google Scholar 

  11. M. Ohmori and M. Tatebayashi: “An On-line Shopping System Protecting User's Privacy,” IEICE Technical Report Vol. 94, IT94-66, ISEC94-26, pp. 25–32 (1995). [in Japanese]

    Google Scholar 

  12. R. L. Rivest, A. Shamir and L. Adleman: “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No.2, pp. 120–126 (1978).

    Article  Google Scholar 

  13. C. P. Schnorr: “Efficient Signature Generation by Smart Cards,” Journal of Cryptology, Vol. 4, No.3, pp. 161–174 (1991).

    Article  Google Scholar 

  14. Y. Takashima, S. Ishii and K. Yamanaka: “An Intellectual Property Protection System Using a PCMCIA Card,” Proc. of The 1995 Symposium on Cryptography and Information Security, SCIS95-B5.5 (Jan. 1995). [in Japanese]

    Google Scholar 

  15. V. Varadharajan, P. Allen and S. Black: “An Analysis of the Proxy Problem in Distributed Systems,” Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.255–275 (May 1991).

    Google Scholar 

  16. K. Sakurai and Y. Yamane: “Blind Decoding, Blind Undeniable Signatures, and their Applications to Privacy Protection,” Lecture Notes in Computer Science 1174, Information Hiding, Springer-Verlag, pp.257–264 (1996).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mambo, M., Okamoto, E., Sakurai, K. (1997). Protection of data and delegated keys in digital distribution. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027934

Download citation

  • DOI: https://doi.org/10.1007/BFb0027934

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics