skip to main content
10.1145/800070.802212acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Probabilistic encryption & how to play mental poker keeping secret all partial information

Published:05 May 1982Publication History

ABSTRACT

This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, cannot obtain any information about the clear-text.

Any implementation of a Public Key Cryptosystem, as proposed by Diffie and Hellman in [8], should possess this property.

Our Encryption Scheme follows the ideas in the number theoretic implementations of a Public Key Cryptosystem due to Rivest, Shamir and Adleman [13], and Rabin [12].

References

  1. 1.Adleman, L., Private Communication, 1981.Google ScholarGoogle Scholar
  2. 2.Adleman, L., Manders K. and Miller G., On Taking Roots In Finite Fields, Proceedings of the 18th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 1977, 175-177.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Adleman, L., On Distinguishing Prime Numbers from Composite Numbers, Proceedings of the 21st IEEE Symposium on the Foundations of Computer Science (FOCS), Syracuse, N.Y., 1980, 387-408.Google ScholarGoogle Scholar
  4. 4.Blum, M., Three Applications of The Oblivious Transfer, to appear, 1981.Google ScholarGoogle Scholar
  5. 5.Blum, M., and Micali, S., How to Flip A Coin Through the Telephone, to appear, 1982.Google ScholarGoogle Scholar
  6. 6.Blum, M., Mental Poker, to appear, 1982.Google ScholarGoogle Scholar
  7. 7.Brassard, G., Relativized Cryptography, Proceedings of the 20st IEEE Symposium on the Foundations of Computer Science (FOCS), San Juan, Puerto Rico, 1979, 383-391.Google ScholarGoogle Scholar
  8. 8.Diffie, W., and M. E. Hellman, New Direction in Cryptography, IEEE Trans. on Inform. Th. IT-22, 6 (1976), 644-654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Goldwasser S., and Micali S., A Bit by Bit Secure Public Key Cryptosystem, Memorandum NO. UCB/ERL M81/88, University of California, Berkeley, December 1981.Google ScholarGoogle Scholar
  10. 10.Lipton, R., How to Cheat at Mental Poker, Proceeding of the AMS short course on Cryptology, January 1981.Google ScholarGoogle Scholar
  11. 11.Miller, G., Riemann's Hypothesis and Tests for Primality, Ph.D. Thesis, U.C. Berkeley, 1975.Google ScholarGoogle Scholar
  12. 12.Rabin, M., Digitalized Signatures and Public-Key Functions As Intractable As Factorization, MIT/LCS/TR-212, Technical Memo MIT, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Rivest, R., Shamir, A., Adleman, L., A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, February 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.Shamir, Rivest, and Adleman, Mental Poker, MIT Technical Report, 1978.Google ScholarGoogle Scholar
  15. 15.Shanks, D., Solved and Unsolved Problems in Number Theory, Chelsea Publishing Co. (1978). Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Probabilistic encryption & how to play mental poker keeping secret all partial information

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          STOC '82: Proceedings of the fourteenth annual ACM symposium on Theory of computing
          May 1982
          408 pages
          ISBN:0897910702
          DOI:10.1145/800070

          Copyright © 1982 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 May 1982

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,469of4,586submissions,32%

          Upcoming Conference

          STOC '24
          56th Annual ACM Symposium on Theory of Computing (STOC 2024)
          June 24 - 28, 2024
          Vancouver , BC , Canada

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader