Lect. 18: Cryptographic Protocols. Contents . Cryptographic Protocols Special Signatures Secret Sharing and Threshold Cryptography Zero-knowledge Proofs Identification, Authentication Protecting your P rivacy . 1. Cryptographic Protocols . Cryptographic Protocols .
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Secret Sharing and Threshold Cryptography
Protecting your Privacy
according to applications
- Blind Signature
- Proxy Signature
Signing without seeing the message
- We should not reveal the content of the letter to the signer.
- For example, using a carbon-enveloped message
1) Send an carbon-enveloped message
2) Sign on the envelop
3) Take off the envelop and
get the signed message
He is also named as
the “father of E-cash”
Blind signature scheme is a protocol that allows the provider to obtain a valid signature for a message m from the signer without him seeing the message and its signature.
Get a signature for a message m.
m’ = H(m) re mod N
σ’ = m’d mod N
σ = σ’ r-1 mod N
σ = σ’ r-1 mod N = (H(m) re)d r-1 mod N = H(m)d mod N
σ isa valid signature of the signer
The signer cannot have any information on m and σ.