CryptoDB
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
Authors: |
- Oded Goldreich
- Birgit Pfitzmann
- Ronald L. Rivest
|
Download: |
- URL: http://eprint.iacr.org/1997/012
- Search ePrint
- Search Google
|
Abstract: |
We introduce delegation schemes wherein a user may delegate rights to
himself, i.e., to other public keys he owns, but may
not safely delegate those rights to others, i.e., to their
public keys. In our motivating application, a user
has a primary (long-term) key that receives rights, such as access
privileges, that may not be delegated to others, yet the user may
reasonably wish to delegate these rights to new
secondary (short-term) keys he creates to use on his laptop when
traveling, to avoid having to store his primary secret key on the
vulnerable laptop.
We propose several cryptographic schemes, both generic and practical,
that allow such self-delegation while providing strong motivation for
the user not to delegate rights that he only obtained for personal use
to other parties.
|
BibTeX
@misc{eprint-1997-11294,
title={Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop},
booktitle={IACR Eprint archive},
keywords={Delegation, subkeys, key hierarchy, Zero-Knowledge Proofs, Knowledge Complexity, Threshold Schemes, gradual release of secrets, Signature Schemes, Non-Interactive Zero-Knowledge, Commitment Schemes.},
url={http://eprint.iacr.org/1997/012},
note={Appeared in the THEORY OF CRYPTOGRAPHY LIBRARY and has been included in the ePrint Archive. oded@wisdom.weizmann.ac.il 10500 Received September 16th, 1997. Revised May 1998. Revised again August 1998.},
author={Oded Goldreich and Birgit Pfitzmann and Ronald L. Rivest},
year=1997
}