Abstract
This paper describes a method of proving that a prover (or a crypt-analyst) really knows a secret plaintext or a new code-breaking algorithm for a particular public-key cryptosystem, without revealing any information about the plaintext or algorithm itself. We propose a secure direct protocol which is more efficient than the conventional protocols. This protocol requires only two transmissions between a prover and a verifier. A general form of the secure direct protocol is shown. The explicit forms for the RSA cryptosystem and the discrete logarithm problem are also proposed.
Preview
Unable to display preview. Download preview PDF.
References
M. Blum: “Three applications of the oblivious transfer: 1. coin flipping by telephone, 2. how to exchange secrets, 3. how to send certified electronic mail,” Dept. EECS, Univ. of California, Berkeley, Calif. (1981).
G. Brassard, and C. Crepeau,:“Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond”, Proc. 27th Symp. on Foundations of Computer Science (FOCS), pp.188–195, (1986).
M. Blum, P. Feldman, and S. Micali:“Non-interactive zero-knowledge proof systems and applications”, Proc. of 18th Symp. on Theory of Computing (STOC), pp.103–112, (1988).
D. Chaum, J. Evertse and J. Graaf,:“An improved protocol for demonstrating possession of a discrete logarithm and some generalizations”, Proc. of EUROCRYPT'87, Lecture Notes in Computer Science Vol. 304, pp.127–142, Springer-Verlag, (1987).
A. DeSantis, S. Micali, and G. Persiano,: “Non-interactive zero-knowledge proof systems”, Proc. of Crypto'87, Lecture Notes in Computer Science Vol. 293 pp.52–72, Springer-Verlag, (1987).
A. Fiat and A. Shamir,: “How to prove yourself: Practical solutions to identification and signature problems”, Proc. of CRYPTO'86, Lecture Notes in Computer Science Vol. 263, pp.186–194, Springer-Verlag, (1986).
O. Goldreich, S. Micali, and A. Wigderson,: “Proofs that yield nothing but their validity and a methodology of cryptographic protocol design”, Proc. of 27th Symp. on Foundations of Computer Science (FOCS), pp.174–187 (1986).
K. Kizaki: “A note on zero-knowledge proof for the discrete logarithm problem”, Research Reports on Information Sciences at Tokyo Institute of Technology, March (1987).
K. Koyama and S. A. Vanstone: “How to demonstrate the breaking of public-key cryptosystems”, Proc. of the 1987 Workshop on Cryptography and Information Security, Noda, Japan, pp.161–170, July, (1987).
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koyama, K. (1990). Direct demonstration of the power to break public-key cryptosystems. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030346
Download citation
DOI: https://doi.org/10.1007/BFb0030346
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53000-8
Online ISBN: 978-3-540-46297-2
eBook Packages: Springer Book Archive