How to generate and exchange secrets
- 1 October 1986
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 02725428,p. 162-167
- https://doi.org/10.1109/sfcs.1986.25
Abstract
In this paper we introduce a new tool for controlling the knowledge transfer process in cryptographic protocol design. It is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature. Specifically, we show how two parties A and B can interactively generate a random integer N = p·q such that its secret, i.e., the prime factors (p, q), is hidden from either party individually but is recoverable jointly if desired. This can be utilized to give a protocol for two parties with private values i and j to compute any polynomially computable functions f(i,j) and g(i,j) with minimal knowledge transfer and a strong fairness property. As a special case, A and B can exchange a pair of secrets sA, sB, e.g. the factorization of an integer and a Hamiltonian circuit in a graph, in such a way that sA becomes computable by B when and only when sB becomes computable by A. All these results are proved assuming only that the problem of factoring large intergers is computationally intractable.Keywords
This publication has 11 references indexed in Scilit:
- Limits on the security of coin flips when half the processors are faultyPublished by Association for Computing Machinery (ACM) ,1986
- The cryptographic security of truncated linearly related variablesPublished by Association for Computing Machinery (ACM) ,1985
- A private interactive test of a boolean predicate a minimum-knowledge public-key cryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- How to Exchange Half a BitPublished by Springer Nature ,1984
- Trapdoor pseudo-random number generators, with applications to protocol designPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- How to exchange (secret) keysACM Transactions on Computer Systems, 1983
- Coin flipping by telephone a protocol for solving impossible problemsACM SIGACT News, 1983
- Protocols for secure computationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Probabilistic encryption & how to play mental poker keeping secret all partial informationPublished by Association for Computing Machinery (ACM) ,1982