Blind decoding, blind undeniable signatures, and their applications to privacy protection

Kouichi Sakurai, Yoshinori Yamane

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

A cryptographic concept, blind decoding is discussed: a client has a message encrypted with a server's public key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server's secret key. Blind decoding is a useful tool for protecting user's privacy in on-line shopping over the Internet. The RSA-based blind decoding is easily converted from the similar protocol as the Chaum's blind signature scheme, and a blind decoding protocol for the E1Gama] encryption scheme is newly proposed. Moreover, the practical gap between the known RSA-based blind decoding and our E1Gamal-based scheme is discussed in the application to protecting copyright matter of electronic documents. In blind decoding scheme, undeteetability of the decrypted message has both negative and positive aspects: a negative aspect is considered as the problem of spotting the oracle and a positive aspect is applicable to making undeniable signatures blind against the signer.

Original languageEnglish
Title of host publicationInformation Hiding - 1st International Workshop, Proceedings
EditorsRoss Anderson
PublisherSpringer Verlag
Pages257-264
Number of pages8
ISBN (Print)9783540619963
Publication statusPublished - Jan 1 1996
Event1st International Workshop on Information Hiding, 1996 - Cambridge, United Kingdom
Duration: May 30 1996Jun 1 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1174
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Workshop on Information Hiding, 1996
CountryUnited Kingdom
CityCambridge
Period5/30/966/1/96

Fingerprint

Undeniable Signature
Blind Signature
Privacy Protection
Decoding
Servers
Server
Network protocols
Decode
Public key
Signature Scheme
Encryption
Cryptography
Privacy
Electronics
Internet

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Sakurai, K., & Yamane, Y. (1996). Blind decoding, blind undeniable signatures, and their applications to privacy protection. In R. Anderson (Ed.), Information Hiding - 1st International Workshop, Proceedings (pp. 257-264). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1174). Springer Verlag.

Blind decoding, blind undeniable signatures, and their applications to privacy protection. / Sakurai, Kouichi; Yamane, Yoshinori.

Information Hiding - 1st International Workshop, Proceedings. ed. / Ross Anderson. Springer Verlag, 1996. p. 257-264 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1174).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sakurai, K & Yamane, Y 1996, Blind decoding, blind undeniable signatures, and their applications to privacy protection. in R Anderson (ed.), Information Hiding - 1st International Workshop, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1174, Springer Verlag, pp. 257-264, 1st International Workshop on Information Hiding, 1996, Cambridge, United Kingdom, 5/30/96.
Sakurai K, Yamane Y. Blind decoding, blind undeniable signatures, and their applications to privacy protection. In Anderson R, editor, Information Hiding - 1st International Workshop, Proceedings. Springer Verlag. 1996. p. 257-264. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Sakurai, Kouichi ; Yamane, Yoshinori. / Blind decoding, blind undeniable signatures, and their applications to privacy protection. Information Hiding - 1st International Workshop, Proceedings. editor / Ross Anderson. Springer Verlag, 1996. pp. 257-264 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{fd6718ebe4974081b61d4247cb9ce908,
title = "Blind decoding, blind undeniable signatures, and their applications to privacy protection",
abstract = "A cryptographic concept, blind decoding is discussed: a client has a message encrypted with a server's public key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server's secret key. Blind decoding is a useful tool for protecting user's privacy in on-line shopping over the Internet. The RSA-based blind decoding is easily converted from the similar protocol as the Chaum's blind signature scheme, and a blind decoding protocol for the E1Gama] encryption scheme is newly proposed. Moreover, the practical gap between the known RSA-based blind decoding and our E1Gamal-based scheme is discussed in the application to protecting copyright matter of electronic documents. In blind decoding scheme, undeteetability of the decrypted message has both negative and positive aspects: a negative aspect is considered as the problem of spotting the oracle and a positive aspect is applicable to making undeniable signatures blind against the signer.",
author = "Kouichi Sakurai and Yoshinori Yamane",
year = "1996",
month = "1",
day = "1",
language = "English",
isbn = "9783540619963",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "257--264",
editor = "Ross Anderson",
booktitle = "Information Hiding - 1st International Workshop, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Blind decoding, blind undeniable signatures, and their applications to privacy protection

AU - Sakurai, Kouichi

AU - Yamane, Yoshinori

PY - 1996/1/1

Y1 - 1996/1/1

N2 - A cryptographic concept, blind decoding is discussed: a client has a message encrypted with a server's public key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server's secret key. Blind decoding is a useful tool for protecting user's privacy in on-line shopping over the Internet. The RSA-based blind decoding is easily converted from the similar protocol as the Chaum's blind signature scheme, and a blind decoding protocol for the E1Gama] encryption scheme is newly proposed. Moreover, the practical gap between the known RSA-based blind decoding and our E1Gamal-based scheme is discussed in the application to protecting copyright matter of electronic documents. In blind decoding scheme, undeteetability of the decrypted message has both negative and positive aspects: a negative aspect is considered as the problem of spotting the oracle and a positive aspect is applicable to making undeniable signatures blind against the signer.

AB - A cryptographic concept, blind decoding is discussed: a client has a message encrypted with a server's public key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server's secret key. Blind decoding is a useful tool for protecting user's privacy in on-line shopping over the Internet. The RSA-based blind decoding is easily converted from the similar protocol as the Chaum's blind signature scheme, and a blind decoding protocol for the E1Gama] encryption scheme is newly proposed. Moreover, the practical gap between the known RSA-based blind decoding and our E1Gamal-based scheme is discussed in the application to protecting copyright matter of electronic documents. In blind decoding scheme, undeteetability of the decrypted message has both negative and positive aspects: a negative aspect is considered as the problem of spotting the oracle and a positive aspect is applicable to making undeniable signatures blind against the signer.

UR - http://www.scopus.com/inward/record.url?scp=84955619527&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84955619527&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84955619527

SN - 9783540619963

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 257

EP - 264

BT - Information Hiding - 1st International Workshop, Proceedings

A2 - Anderson, Ross

PB - Springer Verlag

ER -