Scott Guthery wrote:
Those interested in predicate encryption might also enjoy
Group Authentication Using The Naccache-Stern Public-Key Cryptosystem
http://arxiv.org/abs/cs/0307059
which takes a different approach and handles negation.
A group authentication protocol authenticates pre-defined groups of
individuals such that:
- No individual is identified
- No knowledge of which groups can be successfully authenticated is known to
the verifier
I don't understand this one, could you say it again with more words?
- No sensitive data is exposed
The paper presents a group authentication protocol based on splitting the
private keys of the Naccache-Stern public-key cryptosystem in such a way
that the Boolean expression defining the authenticable groups is implicit in
the split
Shamelessly, Scott
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
--
http://www.apache-ssl.org/ben.html http://www.links.org/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]