Communications of the ACM
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Non-interactive Cryptosystem for Entity Authentication
ISW '99 Proceedings of the Second International Workshop on Information Security
Message Recovery Fair Blind Signature
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Untraceable blind signature schemes based on discrete logarithm problem
Fundamenta Informaticae
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem
Fundamenta Informaticae
Application-layer design patterns for accountable-anonymous online identities
Telecommunications Policy
Hi-index | 0.02 |
There is a growing concern that the wide use of encryption may be more dangerous than helpful to society. In particular, good encryption schemes make court-authorized line-tapping, an effective tool for law enforcement, impossible. Addressing this concern, we show how to construct cryptosystems in a fair way, that is, so as to allow a democratic country to strike the desired balance between the needs of the Government and those of the Citizens. Fair cryptosystems enjoy the following properties: (1) they cannot be misused by criminal organizations and (2) they guarantee to the Citizens exactly the same rights to privacy they currently have under the law. We actually show how to transform any cryptosystem into a fair one. The transformed systems preserve the security and efficiency of the original ones. Thus one can still use whatever system he believes to be more secure, and enjoy the additional properties of fairness. Moreover, for today''s best known cryptosystems, our transformation is particularly efficient and convenient.