Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext

نویسندگان

  • Yuliang Zheng
  • Jennifer Seberry
چکیده

This paper presents three methods for strengthening pub lic key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks In an adaptively chosen ciphertext attack an attacker can query the deciphering algorithm with any cipher texts except for the exact object ciphertext to be cryptanalyzed The rst strengthening method is based on the use of one way hash functions the second on the use of universal hash functions and the third on the use of digital signature schemes Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in nite elds Two other issues namely applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems are also discussed

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)

This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any cipher-texts, except for the exact object ciphertext to be cryptanalyzed. The rst strengthening method is based on the use of one-way ha...

متن کامل

SEG – A Provably Secure Variant of El-Gamal

The Zheng-Seberry (ZS) [9] encryption scheme was published in 1993 and was one of the first practical schemes that was considered secure against an adaptively chosen ciphertext adversary. This paper shows that the semantic security of the one-way hash variant of the ZS scheme is actually insecure against an adaptively chosen ciphertext adversary. Attempts to modify the ZS scheme resulted in a v...

متن کامل

Another Method for Attaining Security

Practical approaches to constructing public key cryptosystems secure against chosen ciphertext attacks were rst initiated by Damgard and further extended by Zheng and Seberry. In this paper we rst point out that in some cryptosystems proposed by Zheng and Seberry the method for adding authentication capability may fail just under known plaintext attacks. Next, we present a new method for immuni...

متن کامل

A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack

1 I n t r o d u c t i o n In this paper, we present and analyze a new public key cryptosystem that is provably secure against adaptive chosen ciphertext attack (as defined by Rackoff and Simon [20]). The scheme is quite practical, requiring just a few exponentiations over a group. Moreover, the proof of security relies only on a standard intractability assumption, namely, the hardness of the Di...

متن کامل

Adaptively-Secure, Non-interactive Public-Key Encryption

Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret data of alreadycorrupted parties. Ideally, an adaptively-secure encryption scheme should, like standard public-key encryption, allow arbitrarily-many parties to use a single encryption key to securely encrypt arbitra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1992