Abstract
Given that tamperfree devices exist it is possible to construct true signature schemes that have the advantages of arbitrated signature schemes, protection against disavowing or forging messages, and lacking certain short commings. Other cryptographic protocols can also be improved. The contents of tamperfree devices cannot be examined as well as not modified.
It is not required that the message go directly to A. It might be sent to B first who then sends it to A.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Selim G. Akl. Digital signatures: a tutorial survey. IEEE Computer, 16(2):15–24, 1983.
G. R. Blakley. Safeguarding cryptographic keys. In Proc. AFIPS 1979 NCC, pages 313–317, 1979.
George I. Davida, Richard A. DeMillo, and Richard J. Lipton. Protecting shared cryptographic keys. In Proc. 1980 Symp. on Security and Privacy, pages 100–102, IEEE, April 1980.
Donald W. Davies. Some regular properties of the ‘data encryption standard’. In Advances in Cryptology: Proceedings of Crypto-82, pages 89–96, 1983. Actually presented at Crypto-81.
Yvo Desmedt and Jean-Jacques Quisquater. Public key system based on the difficulty of tampering (is there a diffference between des and rsa?). In CRYPTO’86 Abstracts and Papers, pages 15-1–15-3, 1986.
W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. on Inform. Theory, 22(6):644–654, 1976.
Brian J. Matt. Seiectiuely Breakable Cyptosystems and Personal Keys. Master’s thesis, University of Wisconsin Milwaukee, May 1981.
Henk Meijer and Selim Akl. Digital signature schemes. Ctyptologia, 6(4):329–338, October 1982.
R. C. Merkle. Protocols for public key cryptosystems. In Proc. 1980 Symp. on Security and Privacy, pages 122–134, IEEE, April 1980.
M. Rabin. Digitalized signatures. In R. A. DeMillo et al., editors, Foundations of Secure Computation, pages 155–166, 1978.
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptograms. Communications of the A CM, 21(2), Feburary 1978.
Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612–613, 1979.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Davida, G.I., Matt, B.J. (1988). Arbitration in Tamper Proof Systems. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_18
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive