Skip to main content

Direct demonstration of the power to break public-key cryptosystems

  • Section 1 Public-Key Cryptosystems
  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '90 (AUSCRYPT 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 453))

Included in the following conference series:

Abstract

This paper describes a method of proving that a prover (or a crypt-analyst) really knows a secret plaintext or a new code-breaking algorithm for a particular public-key cryptosystem, without revealing any information about the plaintext or algorithm itself. We propose a secure direct protocol which is more efficient than the conventional protocols. This protocol requires only two transmissions between a prover and a verifier. A general form of the secure direct protocol is shown. The explicit forms for the RSA cryptosystem and the discrete logarithm problem are also proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Blum: “Three applications of the oblivious transfer: 1. coin flipping by telephone, 2. how to exchange secrets, 3. how to send certified electronic mail,” Dept. EECS, Univ. of California, Berkeley, Calif. (1981).

    Google Scholar 

  2. G. Brassard, and C. Crepeau,:“Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond”, Proc. 27th Symp. on Foundations of Computer Science (FOCS), pp.188–195, (1986).

    Google Scholar 

  3. M. Blum, P. Feldman, and S. Micali:“Non-interactive zero-knowledge proof systems and applications”, Proc. of 18th Symp. on Theory of Computing (STOC), pp.103–112, (1988).

    Google Scholar 

  4. D. Chaum, J. Evertse and J. Graaf,:“An improved protocol for demonstrating possession of a discrete logarithm and some generalizations”, Proc. of EUROCRYPT'87, Lecture Notes in Computer Science Vol. 304, pp.127–142, Springer-Verlag, (1987).

    Google Scholar 

  5. A. DeSantis, S. Micali, and G. Persiano,: “Non-interactive zero-knowledge proof systems”, Proc. of Crypto'87, Lecture Notes in Computer Science Vol. 293 pp.52–72, Springer-Verlag, (1987).

    Google Scholar 

  6. A. Fiat and A. Shamir,: “How to prove yourself: Practical solutions to identification and signature problems”, Proc. of CRYPTO'86, Lecture Notes in Computer Science Vol. 263, pp.186–194, Springer-Verlag, (1986).

    Google Scholar 

  7. O. Goldreich, S. Micali, and A. Wigderson,: “Proofs that yield nothing but their validity and a methodology of cryptographic protocol design”, Proc. of 27th Symp. on Foundations of Computer Science (FOCS), pp.174–187 (1986).

    Google Scholar 

  8. K. Kizaki: “A note on zero-knowledge proof for the discrete logarithm problem”, Research Reports on Information Sciences at Tokyo Institute of Technology, March (1987).

    Google Scholar 

  9. K. Koyama and S. A. Vanstone: “How to demonstrate the breaking of public-key cryptosystems”, Proc. of the 1987 Workshop on Cryptography and Information Security, Noda, Japan, pp.161–170, July, (1987).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Josef Pieprzyk

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Koyama, K. (1990). Direct demonstration of the power to break public-key cryptosystems. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030346

Download citation

  • DOI: https://doi.org/10.1007/BFb0030346

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53000-8

  • Online ISBN: 978-3-540-46297-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics