Non-interactive Cryptosystem for Entity Authentication

In case of mobile agent based computing system such as agent-based electronic payment and online electronic publishing of multimedia contents, both precise identification and secure authentication schemes are required for its security. The public-key cryptosystem and the digital signature scheme have been the foundation of overall secure systems. The requirement for providing agent based secure digital contents in electronic commerce is to implement the compatible secure entity authentication scheme. In this paper, existing discrete logarithm based Schnorr like authentication schemes are improved by the analysis of performance and security on the interactive protocols. And ElGamal type authentication schemes are also proposed. Then, they are enhanced with oblivious transfer based non-interactive public key cryptosystem for entity authentication. Proposed non-interactive protocols are applicable to the noninteractive zero knowledge proofs and they can provide compatible performance and safety in distributed commerce applications such as copyright protection system on multimedia contents.

[1]  Silvio Micali,et al.  Non-Interactive Zero-Knowledge with Preprocessing , 1988, CRYPTO.

[2]  Silvio Micali,et al.  Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.

[3]  George Cybenko,et al.  Mobile agents for mobile computing , 1996 .

[4]  Giovanni Di Crescenzo,et al.  Randomness-Efficient Non-Interactive Zero-Knowledge (Extended Abstract) , 1997, ICALP.

[5]  S. Micali Fair cryptosystems , 1994 .

[6]  Ioannis Pitas,et al.  Digital watermarking: An overview , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[7]  S. Brands Off-Line Cash Transfer by Smart Cards. , 1994 .

[8]  Silvio Micali,et al.  Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.

[9]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[10]  Kazuo Ohta,et al.  A Modification of the Fiat-Shamir Scheme , 1988, CRYPTO.

[11]  Martín Abadi,et al.  The Scope of a Logic of Authentication , 1989, Distributed Computing And Cryptography.

[12]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[13]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[14]  Jean-Jacques Quisquater,et al.  A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.

[15]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[16]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[17]  Amos Fiat,et al.  Zero Knowledge Proofs of Identity , 1987, STOC.

[18]  Gustavus J. Simmons,et al.  A survey of information authentication , 1988, Proc. IEEE.

[19]  Manuel Blum,et al.  Non-interactive zero-knowledge and its applications , 1988, STOC '88.

[20]  Claus-Peter Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.

[21]  Tatsuaki Okamoto,et al.  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.

[22]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[23]  Ioannis Pitas,et al.  Digital image watermarking: an overview , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[24]  Stefan Brands,et al.  Electronic cash on the Internet , 1995, Proceedings of the Symposium on Network and Distributed System Security.

[25]  F.-P. Heider,et al.  The secure distribution of digital contents , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[26]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[27]  Jean-Didier Legat,et al.  Architecture of security management unit for safe hosting of multiple agents , 1999, Electronic Imaging.

[28]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[29]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[30]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .