TY - GEN
T1 - Binding ElGamal : A fraud-detectable alternative to key-escrow proposals
AU - Verheul, E.R.
AU - Tilborg, van, H.C.A.
PY - 1997
Y1 - 1997
N2 - We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when not complying with the agreed rules). It can be seen as a middle course between the inflexible but fraud-resistant KMI-proposal [8] and the flexible but non-fraud-resistant concept used in TIS-CKE [2]. Our concept consists of adding binding data to the latter concept, which will not prevent fraud by criminals but makes it at least detectable by third parties without the need of any secret information. In [19], we depict a worldwide framework in which this concept could present a security tool that is flexible enough to be incorporated in any national cryptography policy, on both the domestic and foreign use of cryptography. Here, we present a construction for binding data for ElGamal type public key encryption schemes. As a side result we show that a particular simplification in a multiuser version of ElGamal does not affect its security.
AB - We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when not complying with the agreed rules). It can be seen as a middle course between the inflexible but fraud-resistant KMI-proposal [8] and the flexible but non-fraud-resistant concept used in TIS-CKE [2]. Our concept consists of adding binding data to the latter concept, which will not prevent fraud by criminals but makes it at least detectable by third parties without the need of any secret information. In [19], we depict a worldwide framework in which this concept could present a security tool that is flexible enough to be incorporated in any national cryptography policy, on both the domestic and foreign use of cryptography. Here, we present a construction for binding data for ElGamal type public key encryption schemes. As a side result we show that a particular simplification in a multiuser version of ElGamal does not affect its security.
U2 - 10.1007/3-540-69053-0_10
DO - 10.1007/3-540-69053-0_10
M3 - Conference contribution
SN - 3-540-62975-0
T3 - Lecture Notes in Computer Science
SP - 119
EP - 133
BT - Advances in Cryptology - EUROCRYPT'97 (Proceedings International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997)
A2 - Fumy, W.
PB - Springer
CY - Berlin
ER -