Abstract
In case of mobile agent based computing system such as agent-based electronic payment and online electronic publishing of multimedia contents, both precise identification and secure authentication schemes are required for its security. The public-key cryptosystem and the digital signature scheme have been the foundation of overall secure systems. The requirement for providing agent based secure digital contents in electronic commerce is to implement the compatible secure entity authentication scheme. In this paper, existing discrete logarithm based Schnorr like authentication schemes are improved by the analysis of performance and security on the interactive protocols. And ElGamal type authentication schemes are also proposed. Then, they are enhanced with oblivious transfer based non-interactive public key cryptosystem for entity authentication. Proposed non-interactive protocols are applicable to the noninteractive zero knowledge proofs and they can provide compatible performance and safety in distributed commerce applications such as copyright protection system on multimedia contents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stefan Brands, “Off-Line Cash Transfer by Smart Card,” CWI Report CS-R9455, (1994)
Stefan Brands, “Electronic Cash on the Internet,” Symposium of Network and Distributed System Security, (1995)
M. Burrows, M. Abadi, R. Needham, “The Scope of a Logic of Authentication,” Technical report, DEC System Research Center, (1994)
Gustavus J. Simmons, “A Survey of Information Authentication,” Proceedings of the IEEE, Vol. 76, No. 5, (1988) 603–620
W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, (1976) 472–492
Whitfield Diffie, “The First Ten Years of Public-Key Cryptography,” Proceedings of the IEEE, Vol. 76, No. 5, (1988) 560–577
C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” Advances in Cryptology, Proceedings of Crypto’89, Springer-Verlag, (1990) 239–252
Tatsuaki Okamoto, “Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes,” Advances in Cryptology, Proceedings of Crypto’92, Springer-Verlag, (1993) 31–53
B. Schneier, Applied Cryptography, 2nd Edition, John Wiley & Sons Press (1996)
Alfred J. Menezed, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press (1996)
A. Fiat and A. Shamir, “How to Prove Yourself: Practical Solution to Identification and Signature Problems,” Advances in Cryptology, Proceedings of CRYPTO’86, Springer-Verlag, (1987) 186–199
U. Feige, A. Fiat, A. Shamir, “Zero Knowledge Proofs of Identity,” Proceedings of the 19th Annual ACM Symposium of Theory of Computing, (1989) 210–217
L. C. Guillou and J. J. Quisquater, “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory,” Advances in Cryptology, Proceedings of Eurocrypt’88, Springer-Verlag, (1989) 123–128
T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. IT-30, No. 4, (1985) 469–472
R. L. Rivest, A. Shamir and L. Adleman, “A Method Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, (1978) 120–126
S. Goldwasser, S. Micali, C. Rackoff, “The Knowledge Complexity of Interactive Proofs,” SIAM Journal of Computing, Vol. 18, No. 1, (1989) 186–208
Kazuo Ohta and Tatsuaki Okamoto, “A Modification of the Fiat-Shamir Scheme,” Advances in Cryptology, Proceedings of Crypto’88, Springer-Verlag, (1989) 232–243
M. Rabin, “How to exchange secrets by oblivious transfer,” Technical Reports TR-81, Harvard Aiken Computation Laboratory, (1981)
Mihir Bellare, Silvio Micali, “Non-Interactive Oblivious Transfer and Applications,” Advances in Cryptology, Proceedings of Crypto 89, Springer-Verlag, (1989)
M. Blum, P. Feldman, s. Micali, “Non-Interactive Zero-Knowledge Proof Systems and Applications,” Proceedings of the 20th Annual ACM Symposium on Theory of Computing, (1988)
Alfredo De Santis, Giovanni Di Crescenzo, Pino Persino, “Randomness-Efficient Non-Interactive Zero Knowledge,” ICALP’97 Conference, (1997)
A. D. Santis, S. Micali, G. Persiano, “Non-Interactive Zero-Knowledge Proof Systems,” Advances in Cryptology, Proceedings of Crypto’87, Vol. 293, (1988)
A. D. Santis, S. Micali, G. Persiano, “Non-Interactive Zero-Knowledge Proof-Systems with Preprocessing,” Advances in Cryptology, Proceedings of Crypto’88, Vol. 403, (1989)
S. Micali, “Fair Cryptosystems,” Technical Reports MIT/LCS/TR-579-b, (1993)
R. Gray, D. Kotz, S. Nog, D. Rus and G. Cybento, “Mobile Agents for Mobile Computing,” Proc. Of 2nd Aizu Int’l Symposium on Parallel Algorithm/Architecture Synthesis(pAs97), Fukushima, Japan, Mar., (1997)
C. G. Harrison, D. M. Chess and A. Kershenbaum, “Mobile Agents: Are they a good idea?” Technical Report, IBM T.J. Watson Research Center, Mar., (1995)
T. Gilmont, J.-D. Legat, J,-J. Quisquater, “Architecture of Security Management Unit for Safe Hosting of Multiple Agents,” Security and Watermarking of Multimedia Contents, Proceedings of SPIE, Vol. 3657, (1999)
E. van Faber, R. Hammelrath, FP Heider, “The Secure Distribution of Digital Contents,” ACSAC’97, (1997) 16–22
N. Memon, PW Wong, “Protecting Digital Media Content,” Communications of the ACM, Vol. 41, No. 7, (1998) 35–43
G. Voyatzis, N. Nikolaidis, I. Pitas, “Digital Watermarking: an Overview,” EUSIPCO’98, (1998) 9–12
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, HW., Kim, JE., Kim, TY. (1999). Non-interactive Cryptosystem for Entity Authentication. In: Information Security. ISW 1999. Lecture Notes in Computer Science, vol 1729. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47790-X_8
Download citation
DOI: https://doi.org/10.1007/3-540-47790-X_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66695-0
Online ISBN: 978-3-540-47790-7
eBook Packages: Springer Book Archive