Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext
نویسندگان
چکیده
This paper presents three methods for strengthening pub lic key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks In an adaptively chosen ciphertext attack an attacker can query the deciphering algorithm with any cipher texts except for the exact object ciphertext to be cryptanalyzed The rst strengthening method is based on the use of one way hash functions the second on the use of universal hash functions and the third on the use of digital signature schemes Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in nite elds Two other issues namely applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems are also discussed
منابع مشابه
Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any cipher-texts, except for the exact object ciphertext to be cryptanalyzed. The rst strengthening method is based on the use of one-way ha...
متن کاملSEG – A Provably Secure Variant of El-Gamal
The Zheng-Seberry (ZS) [9] encryption scheme was published in 1993 and was one of the first practical schemes that was considered secure against an adaptively chosen ciphertext adversary. This paper shows that the semantic security of the one-way hash variant of the ZS scheme is actually insecure against an adaptively chosen ciphertext adversary. Attempts to modify the ZS scheme resulted in a v...
متن کاملAnother Method for Attaining Security
Practical approaches to constructing public key cryptosystems secure against chosen ciphertext attacks were rst initiated by Damgard and further extended by Zheng and Seberry. In this paper we rst point out that in some cryptosystems proposed by Zheng and Seberry the method for adding authentication capability may fail just under known plaintext attacks. Next, we present a new method for immuni...
متن کاملA Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
1 I n t r o d u c t i o n In this paper, we present and analyze a new public key cryptosystem that is provably secure against adaptive chosen ciphertext attack (as defined by Rackoff and Simon [20]). The scheme is quite practical, requiring just a few exponentiations over a group. Moreover, the proof of security relies only on a standard intractability assumption, namely, the hardness of the Di...
متن کاملAdaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret data of alreadycorrupted parties. Ideally, an adaptively-secure encryption scheme should, like standard public-key encryption, allow arbitrarily-many parties to use a single encryption key to securely encrypt arbitra...
متن کامل