Logo des Repositoriums
 

Reverse public key encryption

dc.contributor.authorNaccache, David
dc.contributor.authorSteinwandt, Rainer
dc.contributor.authorYung, Moti
dc.contributor.editorBrömme, Arslan
dc.contributor.editorBusch, Christoph
dc.contributor.editorHühnlein, Detlef
dc.date.accessioned2019-05-31T08:18:52Z
dc.date.available2019-05-31T08:18:52Z
dc.date.issued2009
dc.description.abstractThis exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let Ɛ be a public-key encryption algorithm. We observe that if the distributions Ɛ (pk0, \⦁ ) and Ɛ (pk1, \⦁ ) are indistinguishable for two public keys pk0, pk1, then a message bit b ∈ {0, 1} can be embedded in the choice of pkb. As the roles of the public-key and the plaintext are reversed, we refer to the new mode of operation as Reverse Public-Key Encryption (rpke). We present examples of and variations on the idea and explore RPKE's relationship with key privacy, and we also discuss how to employ it to enable a new implementation of deniable encryption.en
dc.identifier.isbn978-3-88579-249-1
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/23181
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofBIOSIG 2009: biometrics and electronic signatures
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-155
dc.titleReverse public key encryptionen
dc.typeText/Conference Paper
gi.citation.endPage170
gi.citation.publisherPlaceBonn
gi.citation.startPage155
gi.conference.date17.–18. September 2009
gi.conference.locationDarmstadt
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
gi-proc-155-012.pdf
Größe:
612.69 KB
Format:
Adobe Portable Document Format