Abstract
We analyze the privacy protection scheme given by Bao, Deng and Feng which is a cryptographic protocol similar to oblivious transfer and private information retrieval schemes. Their scheme is based on a commutative family of ciphers. We point out several security flaws caused by use of an inadequate commutative family of ciphers. Moreover, we remedy the defects by proposing a new scheme that is regarded as an extension of their scheme. We use an approach different from them; we formalize a double encryption and blind decryption scheme employing the ElGamal encryption algorithm and apply it to realize a private information delivery scheme which is an extension of the privacy protection scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bao, F., Deng, R.H., Feng, P.: An efficient and practical scheme for privacy protection in the e-commerce of digital goods. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 162–170. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45247-8_13
Bao, F., Deng, R., Feng, P., Guo, Y., Wu, H.: Secure and private distribution of online video and some related cryptographic issues. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 190–205. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-47719-5_17
Boneh, D., Franklin, M.: Anonymous authentication with subset queries. In: ACM Conference on Computer and Communications Security, pp. 113–119 (1987)
Brassard, G., Crepeau, C., Robert, J.-M.: All-or-nothing disclosure of secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 234–238. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_17
Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402–414. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_28
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston, MA (1983). https://doi.org/10.1007/978-1-4757-0602-4_18
Chor, B., Gilboa, N.: Computationally private information retrieval (extended abstract). In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing. pp. 304–313. STOC 1997, Association for Computing Machinery (1997)
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 41–50 (1995). https://doi.org/10.1109/SFCS.1995.492461
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28, 637–647 (1985)
Gasarch, W.I.: A survey on private information retrieval (2004)
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 151–160. STOC 1998 (1998). https://doi.org/10.1145/276698.276723
Green, M.: Secure blind decryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 265–282. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_16
Lee, C.H., Deng, X., Zhu, H.: Design and security analysis of anonymous group identification protocols. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 188–198. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45664-3_13
Micali, S.: Fair public-key cryptosystems. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 113–138. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_9
Nakazato, J., Wang, L., Yamamura, A.: Privacy enhancing credentials. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 55–61. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76929-3_6
Nyang, D., Yamamura, A.: More efficient threshold signature scheme in gap Diffie-Hellman group. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E92-A, 1720–1723 (2009)
Rabin, M.O.: How to exchange secrets with oblivious transfer (2005). Harvard University Technical report 81 talr@watson.ibm.com 12955. Accessed 21 Jun 2005
Sakurai, K., Yamane, Y.: Blind decoding, blind undeniable signatures, and their applications to privacy protection. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 257–264. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61996-8_45
Santis, A., Crescenzo, G., Persiano, G.: Communication-efficient anonymous group identification. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 73–82. CCS 1998, Association for Computing Machinery (1998)
Tzeng, W.-G.: Efficient 1-out-\(n\) oblivious transfer schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 159–171. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45664-3_11
Viet, D.Q., Yamamura, A., Tanaka, H.: Anonymous password-based authenticated key exchange. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 244–257. Springer, Heidelberg (2005). https://doi.org/10.1007/11596219_20
Yamamura, A.: Homomorphic encryptions of sums of groups. In: Boztaş, S., Lu, H.-F.F. (eds.) AAECC 2007. LNCS, vol. 4851, pp. 357–366. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77224-8_41
Yamamura, A., Kurokawa, T., Nakazato, J.: Threshold anonymous group identification and zero-knowledge proof. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 370–384. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73458-1_27
Yamamura, A., Kurosawa, K.: Generic algorithms and key agreement protocols based on group actions. In: Eades, P., Takaoka, T. (eds.) ISAAC 2001. LNCS, vol. 2223, pp. 208–218. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45678-3_19
Yamamura, A., Saito, T.: Private information retrieval based on the subgroup membership problem. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 206–220. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-47719-5_18
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yamamura, A. (2023). Blind Decryption and Private Information Delivery. In: You, I., Kim, H., Angin, P. (eds) Mobile Internet Security. MobiSec 2022. Communications in Computer and Information Science, vol 1644. Springer, Singapore. https://doi.org/10.1007/978-981-99-4430-9_12
Download citation
DOI: https://doi.org/10.1007/978-981-99-4430-9_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-4429-3
Online ISBN: 978-981-99-4430-9
eBook Packages: Computer ScienceComputer Science (R0)