Improved Public Key Cryptosystems Secure against Chosen Ciphertext Attacks

نویسنده

  • Yuliang Zheng
چکیده

This note describes an improvement to the rst two of the three public key cryptosystems proposed by Zheng and Seberry, which are provably secure against chosen ciphertext attacks. The improvement removes a shortcoming with the original cryptosystems, which occurs when they are used for both con dentiality and sender authentication purposes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks

We show how to construct a public-key cryptosystem (as originally deened by Diie and Hellman) secure against chosen ciphertext attacks, given a public-key cryptosystem secure against passive eavesdropping and a non-interactive zero-knowledge proof system in the shared string model. No such secure cryptosystems were known before.

متن کامل

Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries

This paper proposes two new public-key cryptosystems semantically secure against adaptive chosen-ciphertext attacks. Inspired from a recently discovered trapdoor technique based on composite-degree residues, our converted encryption schemes are proven, in the random oracle model, secure against active adversaries (IND-CCA2) under the assumptions that the Decision Composite Residuosity and Decis...

متن کامل

Eecient Public-key Cryptosystems Provably Secure against Active Adversaries

This paper proposes two new public-key cryptosystems semantically secure against adaptive chosen-ciphertext attacks. Inspired from a recently discovered trap-door technique based on composite-degree residues, our converted encryption schemes are proven, in the random oracle model, secure against active adversaries (NM-CCA2) under the assumptions that the Decision Composite Residuosity and Decis...

متن کامل

Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks 1

This paper presents three methods for strengthening public key cryptosys-tems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object cipher-text to be cryptanalyzed. The rst strengthening method is based on the use of one-way h...

متن کامل

Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks

This paper presents three methods for strengthening public key cryptosys tems in such a way that they become secure against adaptively chosen ciphertext attacks In an adaptively chosen ciphertext attack an attacker can query the deciphering algorithm with any ciphertexts except for the exact object cipher text to be cryptanalyzed The rst strengthening method is based on the use of one way hash ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994