TY - GEN
T1 - Secure set membership using 3Sat
AU - de Mare, Michael
AU - Wright, Rebecca N.
N1 - Funding Information:
★ This work was supported in part by the National Science Foundation under grant number CCR-0331584.
Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2006.
PY - 2006
Y1 - 2006
N2 - A wide variety of powerful cryptographic tools have been built using RSA, Diffie-Hellman, and other similar assumptions as their basis. Computational security has been achieved relative to complexity assumptions about the computational difficulty of a variety of number theoretic problems. However, these problems are closely related, and it is likely that if any one of them turns out to be efficiently solvable with new mathematical advances or new kinds of computational devices, then similar techniques could be applicable to all of them. To provide greater diversity of security assumptions so that a break of one of them is less likely to yield a break of many or all of them, it is important to expand the body of computational problems on which security systems are based. Specifically, we suggest the use of hardness assumptions based on the complexity of logic problems, and in particular, we consider the well known Boolean 3Sat problem. In this paper, we consider the use of the 3Sat problem to provide a cryptographic primitive, secure set membership. Secure set membership is a general problem for participants holding set elements to generate a representation of their set that can then be used to prove knowledge of set elements to others. Set membership protocols can be used, for example, for authentication problems such as digital credentials and some signature problems such as timestamping.
AB - A wide variety of powerful cryptographic tools have been built using RSA, Diffie-Hellman, and other similar assumptions as their basis. Computational security has been achieved relative to complexity assumptions about the computational difficulty of a variety of number theoretic problems. However, these problems are closely related, and it is likely that if any one of them turns out to be efficiently solvable with new mathematical advances or new kinds of computational devices, then similar techniques could be applicable to all of them. To provide greater diversity of security assumptions so that a break of one of them is less likely to yield a break of many or all of them, it is important to expand the body of computational problems on which security systems are based. Specifically, we suggest the use of hardness assumptions based on the complexity of logic problems, and in particular, we consider the well known Boolean 3Sat problem. In this paper, we consider the use of the 3Sat problem to provide a cryptographic primitive, secure set membership. Secure set membership is a general problem for participants holding set elements to generate a representation of their set that can then be used to prove knowledge of set elements to others. Set membership protocols can be used, for example, for authentication problems such as digital credentials and some signature problems such as timestamping.
UR - http://www.scopus.com/inward/record.url?scp=84946481179&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84946481179&partnerID=8YFLogxK
U2 - 10.1007/11935308_32
DO - 10.1007/11935308_32
M3 - Conference contribution
AN - SCOPUS:84946481179
SN - 9783540494966
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 452
EP - 468
BT - Information and Communications Security - 8th International Conference, ICICS 2006, Proceedings
A2 - Ning, Peng
A2 - Qing, Sihan
A2 - Li, Ninghui
PB - Springer Verlag
T2 - 8th International Conference on Information and Communications Security, ICICS 2006
Y2 - 4 December 2006 through 7 December 2006
ER -