Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems

نویسنده

  • Tapan Rai
چکیده

In [2], Stanislav Bulygin presents a chosen-ciphertext attack against certain instances of noncommutative polly cracker-type cryptosystems which were proposed in [7] and [9]. In this article, we present generalized versions of this attack, which can be used against virtually all polly cracker-type cryptosystems. We then present a simple but effective techique to counter these attacks. We also present a technique to counter an adaptive chosen-ciphertext attack which was first described by Neil Koblitz in [8].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security

In this paper we consider chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems. We present several versions of these attacks, as well as techniques to counter them. First we introduce a chosen-ciphertext attack, which assumes a very simple private key. We then present generalizations of this attack which are valid in more general situations, and propose a simple but...

متن کامل

Chosen-ciphertext attack on noncommutative Polly Cracker

1 Noncommutative Polly Cracker and preliminaries from noncommutative algebra The noncommutative Polly Cracker cryptosystems were developed by T.Rai in his Ph.D. dissertation ([1]), and rely on the fact that there are ideals of noncom-mutative algebras over finite fields that have infinite reduced Groebner bases. First let us briefly present notations that will be used further in the text. Every...

متن کامل

Practical Fully Homomorphic Encryption for Integers over Polynomial Quotient Rings

In this article we describe a simplified version of Polly Cracker-style fully homomorphic encryption scheme. The main feature of our scheme is an ability to define a strict upper bound of ciphertext size when performing calculations on it for both addition and multiplication. Combined with homomorphic properties of Polly Cracker it’s able to reach high calculation performance without degrading ...

متن کامل

Improved Public Key Cryptosystems Secure against Chosen Ciphertext Attacks

This note describes an improvement to the rst two of the three public key cryptosystems proposed by Zheng and Seberry, which are provably secure against chosen ciphertext attacks. The improvement removes a shortcoming with the original cryptosystems, which occurs when they are used for both con dentiality and sender authentication purposes.

متن کامل

Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks

We show how to construct a public-key cryptosystem (as originally deened by Diie and Hellman) secure against chosen ciphertext attacks, given a public-key cryptosystem secure against passive eavesdropping and a non-interactive zero-knowledge proof system in the shared string model. No such secure cryptosystems were known before.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005