IMMUNIZING PUBLIC-KEY CRYPTOSYSTEMS AGAINST CHOSEN CIPHERTEXT ATTACKS

被引:30
|
作者
ZHENG, YL
SEBERRY, J
机构
[1] Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/49.223871
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions, and the third on the use of digitaL signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Security of the three exampLe cryptosystems is formally proved. Two other issues, namely, applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed.
引用
收藏
页码:715 / 724
页数:10
相关论文
共 50 条
  • [1] Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
    Emura, Keita
    Hanaoka, Goichiro
    Nuida, Koji
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (08) : 1623 - 1683
  • [2] Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
    Keita Emura
    Goichiro Hanaoka
    Koji Nuida
    Go Ohtake
    Takahiro Matsuda
    Shota Yamada
    Designs, Codes and Cryptography, 2018, 86 : 1623 - 1683
  • [3] Reaction attacks against several public-key cryptosystems
    Hall, C
    Goldberg, I
    Schneier, B
    INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
  • [4] Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece public-key cryptosystem
    Verheul, ER
    Doumen, JM
    van Tilborg, HCA
    INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 99 - 119
  • [6] A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
    Camenisch, Jan
    Chandran, Nishanth
    Shoup, Victor
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 351 - +
  • [7] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200
  • [8] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Emura, Keita
    Hanaoka, Goichiro
    Ohtake, Go
    Matsuda, Takahiro
    Yamada, Shota
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 32 - 50
  • [9] Improved public key encryption scheme secure against adaptive chosen-ciphertext attacks
    Chen, Min-Rong
    Zhang, Xi
    He, Kai
    Guan, Chao-Wen
    Liu, Dan
    Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (06): : 1149 - 1154
  • [10] Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    Cramer, R
    Shoup, V
    SIAM JOURNAL ON COMPUTING, 2003, 33 (01) : 167 - 226