Minimum-knowledge interactive proofs for decision problems
SIAM Journal on Computing
Digital signets: self-enforcing protection of digital information (preliminary version)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
An efficient non-interactive statistical zero-knowledge proof system for quasi-safe prime products
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Paillier's cryptosystem revisited
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery
ICICS '99 Proceedings of the Second International Conference on Information and Communication Security
Separability and Efficiency for Generic Group Signature Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A Simple and Secure Way to Show the Validity of Your Public Key
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
RSA-Based Undeniable Signatures
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
Fair Traceable Multi-Group Signatures
Financial Cryptography and Data Security
Data Collection with Self-Enforcing Privacy
ACM Transactions on Information and System Security (TISSEC)
Deterring voluntary trace disclosure in re-encryption mix-networks
ACM Transactions on Information and System Security (TISSEC)
How to keep a secret: leakage deterring public-key cryptosystems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
Certificates play an essential role in public-key cryptography, and are likely to become a cornerstone of commerce-related applications. Traditional certificates, however, are not secure against certificate lending, i.e., a situation in which a certificate holder voluntarily shares with others the rights bestowed upon him through a certificate. This type of abuse is a concern in several types of applications, such as those related to digital rights management.In this paper, we introduce the notion of proprietary and collateral certificates. We present a scheme whereby one certificate, known as a proprietary certificate, may be linked to another, known as a collateral certificate. If the owner of the proprietary certificate shares the associated private key, then the private key of the collateral certificate is simultaneously divulged.Certificates in our scheme can be integrated easily into standard PKI models and work with both RSA and discrete-log-based keys (such as those for DSS). Our scheme leaks no significant information about private keys, and leaks only a small amount of information about certificate ownership. Thus, use of proprietary certificates still allows users to maintain multiple, unlinkable pseudonyms, and adds functionality without posing any threats to user privacy.