Blind decoding, blind undeniable signatures, and their applications to privacy protection

Kouichi Sakurai, Yoshinori Yamane

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Citations (Scopus)

Abstract

A cryptographic concept, blind decoding is discussed: a client has a message encrypted with a server's public key and the client asks the server to decode the message without revealing what is the decoded plaintext nor learning the server's secret key. Blind decoding is a useful tool for protecting user's privacy in on-line shopping over the Internet. The RSA-based blind decoding is easily converted from the similar protocol as the Chaum's blind signature scheme, and a blind decoding protocol for the E1Gama] encryption scheme is newly proposed. Moreover, the practical gap between the known RSA-based blind decoding and our E1Gamal-based scheme is discussed in the application to protecting copyright matter of electronic documents. In blind decoding scheme, undeteetability of the decrypted message has both negative and positive aspects: a negative aspect is considered as the problem of spotting the oracle and a positive aspect is applicable to making undeniable signatures blind against the signer.

Original languageEnglish
Title of host publicationInformation Hiding - 1st International Workshop, Proceedings
EditorsRoss Anderson
PublisherSpringer Verlag
Pages257-264
Number of pages8
ISBN (Print)9783540619963
DOIs
Publication statusPublished - 1996
Event1st International Workshop on Information Hiding, 1996 - Cambridge, United Kingdom
Duration: May 30 1996Jun 1 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1174
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Workshop on Information Hiding, 1996
CountryUnited Kingdom
CityCambridge
Period5/30/966/1/96

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Blind decoding, blind undeniable signatures, and their applications to privacy protection'. Together they form a unique fingerprint.

  • Cite this

    Sakurai, K., & Yamane, Y. (1996). Blind decoding, blind undeniable signatures, and their applications to privacy protection. In R. Anderson (Ed.), Information Hiding - 1st International Workshop, Proceedings (pp. 257-264). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1174). Springer Verlag. https://doi.org/10.1007/3-540-61996-8_45