IMMUNIZING PUBLIC-KEY CRYPTOSYSTEMS AGAINST CHOSEN CIPHERTEXT ATTACKS

被引:30
|
作者
ZHENG, YL
SEBERRY, J
机构
[1] Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/49.223871
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions, and the third on the use of digitaL signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Security of the three exampLe cryptosystems is formally proved. Two other issues, namely, applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed.
引用
收藏
页码:715 / 724
页数:10
相关论文
共 50 条
  • [21] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (04) : 271 - 281
  • [22] Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    Cramer, R
    Shoup, V
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 45 - 64
  • [23] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [24] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [25] Key Distribution for Heterogeneous Public-Key Cryptosystems
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (05) : 464 - 468
  • [26] ATTACKING RSA PUBLIC-KEY CRYPTOSYSTEMS
    HAWKER, P
    ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1655): : 826 - 827
  • [27] THE USE OF FRACTIONS IN PUBLIC-KEY CRYPTOSYSTEMS
    ISSELHORST, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 47 - 55
  • [28] Security of COFB against Chosen Ciphertext Attacks
    Khairallah, Mustafa
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (01) : 138 - 157
  • [29] PROVING SECURITY AGAINST CHOSEN CIPHERTEXT ATTACKS
    BLUM, M
    FELDMAN, P
    MICALI, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 256 - 268
  • [30] Efficient and secure public-key cryptosystems
    Takagi, T
    CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237