Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
(Publisher: John Wiley & Sons, Inc.)
Author(s): Bruce Schneier
ISBN: 0471128457
Publication Date: 01/01/96
Previous | Table of Contents | Next |
Unfortunately, a pair of dishonest parties can cheat. Alice and Carol, working together, can easily find out what secret Bob is getting: If they know the FBI of Cb and Bobs encryption algorithm, they can find b such that Cb has the right FBI. And Bob and Carol, working together, can easily get all the secrets from Alice.
If you assume honest parties,theres an easier protocol [389].
If the parties may be dishonest, Bob can prove in zero-knowledge that he knows some r such that C'=Cbre mod n and keep b secret until Alice gives him P' in step (3) [246].
Fair Diffie-Hellman
Fair cryptosystems are a way to do key escrowing in software (see Section 4.14). This example is from Silvio Micali [1084,1085]. It is patented [1086,1087].
In the basic Diffie-Hellman scheme, a group of users share a prime, p, and a generator, g. Alices private key is s, and her public key is t =gs mod p.
Heres how to make Diffie-Hellman fair (this example uses five trustees).
At this point, the KDC knows that the trustees each have a valid piece, and that they can reconstruct the private key if required. However, neither the KDC nor any four of the trustees working together can reconstruct Alices private key.
Micalis papers [1084,1085] also contain a procedure for making RSA fair and for combining a threshold scheme with the fair cryptosystem, so that m out of n trustees can reconstruct the private key.
Failsafe Diffie-Hellman
Like the previous protocol, a group of users share a prime, p, and a generator, g. Alices private key is s, and her public key is t =gs mod p.
The trustees can reconstruct A. Since the KDC knows B, this is enough to reconstruct s. And Alice cannot make use of any subliminal channels to send unauthorized information. This protocol, discussed in [946,833] is being patented.
Zero-Knowledge Proof of a Discrete Logarithm
Peggy wants to prove to Victor that she knows an x that satisfies
where p is a prime, and x is a random number relatively prime to p - 1. The numbers A, B, and p are public, and x is secret. Heres how Peggy can prove she knows x without revealing it (see Section 5.1) [338,337].
Peggys probability of successfully cheating is 2-t.
Zero-Knowledge Proof of the Ability to Break RSA
Alice knows Carols private key. Maybe she has broken RSA; maybe she has broken into Carols house and stolen the key. Alice wants to convince Bob that she knows Carols key. However, she doesnt want to tell Bob the key or even decrypt one of Carols messages for Bob. Heres a zero-knowledge protocol by which Alice convinces Bob that she knows Carols private key [888].
Previous | Table of Contents | Next |