51 research outputs found
Secret-key certificates
The notion of secret-key certificate schemes is introduced and formalized. As with public-key certificates, triples consisting of a secret key, a corresponding public key, and a secret-key certificate on the public key can only be retrieved by engaging in an issuing protocol with the issuer. The difference with public-key certificates is that pairs consisting of a public key and a secret-key certificate on the public key can be generated by anyone, with a distribution that is indistinguishable from the distribution according to which they are generated in the issuing protocol. Secret-key certificates offer the same functionality as do public-key certificates, because there is no point in using a public-key certificate scheme if the cryptographic actions that are to be performed with respect to a certified public key can be performed without knowing a corresponding secret key. The existence of efficient and secure secret-key certificate schemes is demonstrated by a generally applicable technique for deriving such schemes from signature schemes of a well-known type. The new notion is believed to be of interest in its own right, as it demonstrates an alternative to a stale paradigm in cryptography. More important are the practical advantages: secret-key certificates are better suited for the design of privacy-protecting mechanisms for signature transport, and can be used to construct secure public-key directories and conditional access mechanisms that provably do not leak information that can be of help to forge certificates
More on restrictive blind issuing of secret-key certificates in parallel mode
A minimal variation is proposed of a recently described secret-key certificate scheme that is derived from the Schnorr signature scheme.The issuing protocol of the variation is conjectured to be restrictive blind in parallel mode, motivated by a recent argument of Schoenmakers.The variation demonstrates that the double use of a generator is not problematic in any way, contrary to the belief expressed by Schoenmakers. A more profound argument for the conjectured security in parallel mode is provided, and similar variations are described for secret-key certificates based on Brickell-McCurley signatures. To create some order in the variety of restrictive blind certificate schemes that have been proposed to date, their specific merits and limitations are categorized and discussed
A note on parallel executions of restrictive blind issuing protocols for secret-key certificates
The receiver in a restrictive blind certificate issuing protocol can blind the issued public key and the certificate but not a certain blinding-invariant predicate of the secret key. Recently a generally applicable technique was described for designing restrictive blind issuing protocols for a certain type of secret-key certificates, and it was shown that the resulting issuing protocols should not be run in parallel since that would enable an attack in which completely blinded triples can be retrieved. To allow the signer in highly demanding applications to run the restrictive blind certificate issuing protocol in parallel mode, a simple technique for modifying the issuing protocols was proposed. In this note it is shown that the proposed modification technique does not overcome the parallel attack problem
Secret-key certificates (continued)
A new construction is described for designing secret-key certificate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certificate issuing protocols that enable the Certification Authority to certify public keys, without being able to compromise the confidentiality of the corresponding secret keys. Furthermore the design of secure showing protocols is discussed, exemplified by secret-key certificate schemes based on Fiat-Shamir type signature schemes
Restrictive blind issuing of secret-key certificates in parallel mode
Recently a class of secret-key certificate issuing protocols has been proposed that is believed to be restrictive blind when run in sequential mode. In this report an immunization technique is proposed for modifying these secret-key certificate issuing protocols in order to make them restrictive blind even when run in parallel mode. All the proofs of correctness for the underlying, unmodified protocols are fully preserved under the modification, as is their applicability to privacy-protecting mechanisms for value transport
Restrictive blinding of secret-key certificates
Many signature transporting mechanisms require a signer to issue triples, consisting of a secret key, a matching public key, and a certificate of the signer on the public key. Of particular interest are so-called restrictive blind signature issuing protocols, in which the receiver can blind the issued public key and the certificate but not a certain predicate of the secret key. This paper describes the first generally applicable technique for designing efficient such issuing protocols, based on the recently introduced notion of secret-key certificates. The resulting three-move issuing protocols require the receiver to perform merely a single on-line multiplication, and the property of restrictive blinding can be proved with respect to a plausible intractability assumption. Application of the new issuing protocols results in the most efficient and versatile off-line electronic cash systems known to date, without using the blind signature technique developed by Chaum
Empirical mass-loss rates and clumping properties of Galactic early-type O supergiants
International audienceAims. We investigate the impact of optically thick clumping on spectroscopic stellar wind diagnostics in O supergiants and constrain wind parameters associated with porosity in velocity space. This is the first time the effects of optically thick clumping have been investigated for a sample of massive hot stars, using models which include a full optically thick clumping description. Methods. We re-analyse existing spectroscopic observations of a sample of eight O supergiants previously analysed with the non-local-thermodynamic-equilibrium (NLTE) atmosphere code CMFGEN. Using a genetic algorithm wrapper around the NLTE atmosphere code FASTWIND we obtain simultaneous fits to optical and ultraviolet spectra and determine photospheric properties, chemical surface abundances and wind properties. Results. We provide empirical constraints on a number of wind parameters including the clumping factors, mass-loss rates and terminal wind velocities. Additionally, we establish the first systematic empirical constraints on velocity filling factors and interclump densities. These are parameters that describe clump distribution in velocity-space and density of the interclump medium in physical-space, respectively. We observe a mass-loss rate reduction of a factor of 3.6 compared to theoretical predictions from Vink et al. (2000), and mass-loss rates within a factor 1.4 of theoretical predictions from Björklund et al. (2021). Conclusions. We confirm that including optically thick clumping allows simultaneous fitting of optical recombination lines and ultraviolet resonance lines, including the unsaturated ultraviolet phosphorus lines (P v λλ1118-1128), without reducing the phosphorus abundance. We find that, on average, half of the wind velocity field is covered by dense clumps. We also find that these clumps are 25 times denser than the average wind, and that the interclump medium is 3-10 times less dense than the mean wind. The former result agrees well with theoretical predictions, the latter suggests that lateral filling-in of radially compressed gas might be critical for setting the scale of the rarefied interclump matter
Preparation and characterization of an anionic dye-polycation molecular films by electrostatic Layer-by-Layer adsorption process
This communication reports the formation and characterization of self
assembled films of a low molecular weight anionic dye amaranth and polycation
Poly (allylamine hydrochloride) (PAH) by electrostatic alternating
Layer-by-Layer (LBL) adsorption. It was observed that there was almost no
material loss occurred during adsorption process. The UV-Vis absorption and
fluorescence spectra of amaranth solution reveal that with the increase in
amaranth concentration in solution, the aggregated species starts to dominate
over the monomeric species. New aggregated band at 600 nm was observed in
amaranth-PAH mixture solution absorption spectrum. A new broad low intense band
at the longer wavelength region, in the amaranth-PAH mixture solution
fluorescence spectrum was observed due to the closer association of amaranth
molecule while tagged into the polymer backbone of PAH and consequent formation
of aggregates. The broad band system in the 650-750 nm region in the
fluorescence spectra of different layered LBL films changes in intensity
distribution among various bands within itself, with changing layer number and
at 10 bilayer LBL films the longer wavelength band at 710 nm becomes prominent.
Existence of dimeric or higher order n-meric species in the LBL films was
confirmed by excitation spectroscopic studies. Almost 45 minute was required to
complete the interaction between amaranth and PAH molecules in the 1-bilayer
LBL film.Comment: 10 pages, 5 figure
- …