Heraclitean encryption

Download: PDF.

“Heraclitean encryption” by Michael D. Ernst and Gideon Yuval. Microsoft Research technical report MSR-TR-94-13, (Redmond, WA), March 3, 1994.

Abstract

Most encryption schemes always use the same decryption key to convert a particular codetext into plaintext. If a decryption key that has been revealed to multiple parties is compromised, it is impossible to determine who is responsible for the breach. Heraclitean encryption, which uses public-key encryption (for instance, RSA or elliptic curve) as its cryptographic basis, permits the encryptor to create as many independent decryption keys as desired. Each decryption key can publicly encode information about the party to whom it was issued, so that given a key, anyone can determine its owner. Since decryption keys can be traced, their holders have an incentive to keep them secret.

We discuss applications of Heraclitean encryption, provide an example implementation, discuss weaknesses in that implementation, and explore some practicalities of using the scheme.

We do not address the issue of tracking decrypted information back to the decryptor; the plaintext is identical for each recipient. Heraclitean encryption is applicable to any broadcast medium that can carry proprietary information — for instance, pay-per-view video and wide distribution of commercial software or databases via CD-ROM or bulletin boards.

Download: PDF.

BibTeX entry:

@techreport{ErnstY94,
   author = {Michael D. Ernst and Gideon Yuval},
   title = {Heraclitean encryption},
   institution = {Microsoft Research},
   number = {MSR-TR-94-13},
   address = {Redmond, WA},
   month = {March~3,},
   year = {1994}
}

(This webpage was created with bibtex2web.)

Back to Michael Ernst's publications.