ACE Encrypt : The Advanced Cryptographic Engine ’ s Public Key Encryption Scheme ∗
نویسندگان
چکیده
This document describes the part of the Advanced Cryptographic Engine (ACE ) pertaining to public key encryption. It specifies a public key encryption scheme with enough detail to ensure interoperability between different implementations. This scheme is almost as efficient as commercially used schemes, yet unlike such schemes, can be proven secure under reasonable and well-defined intractability assumptions. A concrete security analysis of the scheme is presented. ∗Change log: First draft, March 1, 2000. Second draft, August 14, 2000: minor corrections.
منابع مشابه
ACE: The Advanced Cryptographic Engine
This document describes the Advanced Cryptographic Engine (ACE ). It specifies a public key encryption scheme as well as a digital signature scheme with enough detail to ensure interoperability between different implementations. These schemes are almost as efficient as commercially used schemes, yet unlike such schemes, can be proven secure under reasonable and well-defined intractability assum...
متن کاملA Comparative Analysis of Hybrid Encryption Schemes Based on Elliptic Curves
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption ...
متن کاملPKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction
Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, we address the question whether it is feasible to construct a PKI based signcryption scheme with tight security reduction in th...
متن کامل“Doctor of Philosophy”
The recent transition to “cloud computing” is changing the way people store and use digital data. Data is more often stored remotely (on a cloud server) and accessed by very weak devices over the internet (e.g. smartphones). In addition to storage, the cloud is expected to manipulate and process the data per the user’s requests, since local processing on the end user’s device is infeasible. Thi...
متن کاملK — Advanced Topics in Cryptography February 5 , 2004 Lecture 4
The focus of this lecture is efficient public-key encryption. In the previous lecture, we discussed a public-key encryption scheme for 1-bit messages. However, to encrypt an `-bit message, we can simply encrypt ` one-bit messages and send these (and we proved last time that this remains secure in the case of public-key encryption). Here, we first describe (briefly) how to combine public and pri...
متن کامل