Abstract
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when not complying with the agreed rules). It can be seen as a middle course between the inflexible but fraud-resistant KMI-proposal [8] and the flexible but non-fraud-resistant concept used in TIS-CKE [2]. Our concept consists of adding binding data to the latter concept, which will not prevent fraud by criminals but makes it at least detectable by third parties without the need of any secret information. In [19], we depict a worldwide framework in which this concept could present a security tool that is flexible enough to be incorporated in any national cryptography policy, on both the domestic and foreign use of cryptography. Here, we present a construction for binding data for ElGamal type public key encryption schemes. As a side result we show that a particular simplification in a multiuser version of ElGamal does not affect its security.
Views expressed here are personal and not necessarily shared by my employer.
Chapter PDF
Similar content being viewed by others
References
R. Anderson, M. Roe, The GCHQ Protocol and its Problems, these proceedings.
D.M. Balenson, C.M. Ellison, S.B. Lipner, S.T. Walker (TIS Inc.), A New Approach to Software Key Escrow Encryption, in: L.J. Hoffman (ed.), Building in Big Brother (Springer, New York, 1996), pp. 180–207. See also http://www.tis.com.
D. Chaum, T.P. Pedersen, Wallet Databases with Observers Advances in Cryptology — CRYPTO’ 92 Proceedings, Springer-Verlag, 1993, pp. 89–105.
D. Coppersmith, Finding a Small Root of a Univariate Modular Equation, Advances in Cryptology — EUROCRYPT’ 96 Proceedings, Springer-Verlag, 1995, pp. 155–165.
R. Cramer, R. Gennaro, B. Schoenmakers A Secure and Optimally Efficient Multi-Authority Election Scheme, these proceedings.
Y. Desmedt, Securing Traceability of Ciphertexts-Towards a Secure Key Escrow System, Advances in Cryptology — EUROCRYPT’ 95 Proceedings, Springer-Verlag, 1995, pp. 147–157.
T. ElGamal, A Public Key Cryptosystem and a Signature scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory 31(4), 1985, pp. 469–472.
Interagency Working Group on Cryptography Policy, Enabling Privacy, Commerce, Security and Public Safety in the Global Information Infrastructure, 17 May 1996, see http://www.cdt.org/crypto/clipper_III.
L.C. Guillou, J.-J. Quisquater A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory, Advances in Cryptology — EUROCRYPT’ 86 Proceedings, Springer-Verlag, 1986, pp. 123–128.
J. Hastad, On Using RSA with Low Exponent in a Public Key Network, Advances in Cryptology — CRYPTO’ 85 Proceedings, Springer-Verlag, 1993, pp. 403–405.
N. Jefferies, C. Mitchell, M. Walker, A Proposed Architecture for Trusted Third Party Services, Cryptography: Policy and Algorithms, Proceedings of the conference, Springer-Verlag (LNCS 1029), 1996, pp. 98–104.
A.K. Lenstra, P. Winkler, Y. Yacobi A Key-Escrow System with Warrants Bounds, Advances in Cryptology — CRYPTO’ 95 Proceedings, Springer-Verlag, 1995, pp. 197–207.
S. Micali, Fair Public-key Cryptosystems, Advances in Cryptology — CRYPTO’ 92 Proceedings, Springer-Verlag, 1993, pp. 113–138.
National Research Council, Cryptography’s Role in Securing the Information Society, K.W. Dam, H.S. Lin (Editors), National Academy Press Washington, D.C. 1996, pp.720.
T.P. Petersen, Distributed Provers with Applications to Undeniable Signatures, Advances in Cryptology — EUROCRYPT’ 91, Springer-Verlag, 1991, pp. 221–242.
T.P. Petersen, A Threshold Cryptosystem Without a Trusted Party, Advances in Cryptology-EUROCRYPT’ 91, Springer-Verlag, 1991, pp. 522–526.
C.P. Schnorr, Efficient Signature Generation for Smart Cards, Advances in Cryptology — CRYPTO’ 89 Proceedings, Springer-Verlag, 1990, pp. 225–232.
D.R. Stinson Cryptography: theory and practice, CRC press, 1995, pp.434.
E.R. Verheul, B.-J. Koops, H.C.A. van Tilborg, Binding Cryptography. A fraud-detectible alternative to key-escrow solutions, Computer Law and Security Report, January–February 1997, pp. 3–14.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Verheul, E.R., van Tilborg, H.C.A. (1997). Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. In: Fumy, W. (eds) Advances in Cryptology — EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69053-0_10
Download citation
DOI: https://doi.org/10.1007/3-540-69053-0_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-62975-7
Online ISBN: 978-3-540-69053-5
eBook Packages: Springer Book Archive