+
Skip to main content

Blind Decryption and Private Information Delivery

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1644))

Included in the following conference series:

  • 368 Accesses

Abstract

We analyze the privacy protection scheme given by Bao, Deng and Feng which is a cryptographic protocol similar to oblivious transfer and private information retrieval schemes. Their scheme is based on a commutative family of ciphers. We point out several security flaws caused by use of an inadequate commutative family of ciphers. Moreover, we remedy the defects by proposing a new scheme that is regarded as an extension of their scheme. We use an approach different from them; we formalize a double encryption and blind decryption scheme employing the ElGamal encryption algorithm and apply it to realize a private information delivery scheme which is an extension of the privacy protection scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bao, F., Deng, R.H., Feng, P.: An efficient and practical scheme for privacy protection in the e-commerce of digital goods. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 162–170. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45247-8_13

    Chapter  Google Scholar 

  2. Bao, F., Deng, R., Feng, P., Guo, Y., Wu, H.: Secure and private distribution of online video and some related cryptographic issues. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 190–205. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-47719-5_17

    Chapter  MATH  Google Scholar 

  3. Boneh, D., Franklin, M.: Anonymous authentication with subset queries. In: ACM Conference on Computer and Communications Security, pp. 113–119 (1987)

    Google Scholar 

  4. Brassard, G., Crepeau, C., Robert, J.-M.: All-or-nothing disclosure of secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 234–238. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_17

    Chapter  Google Scholar 

  5. Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402–414. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_28

    Chapter  Google Scholar 

  6. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston, MA (1983). https://doi.org/10.1007/978-1-4757-0602-4_18

    Chapter  Google Scholar 

  7. Chor, B., Gilboa, N.: Computationally private information retrieval (extended abstract). In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing. pp. 304–313. STOC 1997, Association for Computing Machinery (1997)

    Google Scholar 

  8. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 41–50 (1995). https://doi.org/10.1109/SFCS.1995.492461

  9. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  10. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28, 637–647 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  11. Gasarch, W.I.: A survey on private information retrieval (2004)

    Google Scholar 

  12. Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 151–160. STOC 1998 (1998). https://doi.org/10.1145/276698.276723

  13. Green, M.: Secure blind decryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 265–282. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_16

    Chapter  Google Scholar 

  14. Lee, C.H., Deng, X., Zhu, H.: Design and security analysis of anonymous group identification protocols. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 188–198. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45664-3_13

    Chapter  Google Scholar 

  15. Micali, S.: Fair public-key cryptosystems. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 113–138. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_9

    Chapter  Google Scholar 

  16. Nakazato, J., Wang, L., Yamamura, A.: Privacy enhancing credentials. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 55–61. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-76929-3_6

    Chapter  Google Scholar 

  17. Nyang, D., Yamamura, A.: More efficient threshold signature scheme in gap Diffie-Hellman group. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E92-A, 1720–1723 (2009)

    Google Scholar 

  18. Rabin, M.O.: How to exchange secrets with oblivious transfer (2005). Harvard University Technical report 81 talr@watson.ibm.com 12955. Accessed 21 Jun 2005

    Google Scholar 

  19. Sakurai, K., Yamane, Y.: Blind decoding, blind undeniable signatures, and their applications to privacy protection. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 257–264. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-61996-8_45

    Chapter  Google Scholar 

  20. Santis, A., Crescenzo, G., Persiano, G.: Communication-efficient anonymous group identification. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 73–82. CCS 1998, Association for Computing Machinery (1998)

    Google Scholar 

  21. Tzeng, W.-G.: Efficient 1-out-\(n\) oblivious transfer schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 159–171. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45664-3_11

    Chapter  Google Scholar 

  22. Viet, D.Q., Yamamura, A., Tanaka, H.: Anonymous password-based authenticated key exchange. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 244–257. Springer, Heidelberg (2005). https://doi.org/10.1007/11596219_20

    Chapter  Google Scholar 

  23. Yamamura, A.: Homomorphic encryptions of sums of groups. In: Boztaş, S., Lu, H.-F.F. (eds.) AAECC 2007. LNCS, vol. 4851, pp. 357–366. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77224-8_41

    Chapter  Google Scholar 

  24. Yamamura, A., Kurokawa, T., Nakazato, J.: Threshold anonymous group identification and zero-knowledge proof. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 370–384. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73458-1_27

    Chapter  MATH  Google Scholar 

  25. Yamamura, A., Kurosawa, K.: Generic algorithms and key agreement protocols based on group actions. In: Eades, P., Takaoka, T. (eds.) ISAAC 2001. LNCS, vol. 2223, pp. 208–218. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45678-3_19

    Chapter  MATH  Google Scholar 

  26. Yamamura, A., Saito, T.: Private information retrieval based on the subgroup membership problem. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 206–220. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-47719-5_18

    Chapter  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akihiro Yamamura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yamamura, A. (2023). Blind Decryption and Private Information Delivery. In: You, I., Kim, H., Angin, P. (eds) Mobile Internet Security. MobiSec 2022. Communications in Computer and Information Science, vol 1644. Springer, Singapore. https://doi.org/10.1007/978-981-99-4430-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-4430-9_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-4429-3

  • Online ISBN: 978-981-99-4430-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Keywords

Publish with us

Policies and ethics

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载