Immunizing public key cryptosystems against chosen ciphertext attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks

This paper presents three methods for strengthening public key cryptosys tems in such a way that they become secure against adaptively chosen ciphertext attacks In an adaptively chosen ciphertext attack an attacker can query the deciphering algorithm with any ciphertexts except for the exact object cipher text to be cryptanalyzed The rst strengthening method is based on the use of one way hash ...

متن کامل

Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks 1

This paper presents three methods for strengthening public key cryptosys-tems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object cipher-text to be cryptanalyzed. The rst strengthening method is based on the use of one-way h...

متن کامل

Improved Public Key Cryptosystems Secure against Chosen Ciphertext Attacks

This note describes an improvement to the rst two of the three public key cryptosystems proposed by Zheng and Seberry, which are provably secure against chosen ciphertext attacks. The improvement removes a shortcoming with the original cryptosystems, which occurs when they are used for both con dentiality and sender authentication purposes.

متن کامل

Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks

We show how to construct a public-key cryptosystem (as originally deened by Diie and Hellman) secure against chosen ciphertext attacks, given a public-key cryptosystem secure against passive eavesdropping and a non-interactive zero-knowledge proof system in the shared string model. No such secure cryptosystems were known before.

متن کامل

Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks

Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing the decryption ability. However, only two efficient such schemes have been proposed so far for achievin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal on Selected Areas in Communications

سال: 1993

ISSN: 0733-8716

DOI: 10.1109/49.223871