IMMUNIZING PUBLIC-KEY CRYPTOSYSTEMS AGAINST CHOSEN CIPHERTEXT ATTACKS

被引:30
|
作者
ZHENG, YL
SEBERRY, J
机构
[1] Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/49.223871
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions, and the third on the use of digitaL signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Security of the three exampLe cryptosystems is formally proved. Two other issues, namely, applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed.
引用
收藏
页码:715 / 724
页数:10
相关论文
共 50 条
  • [31] Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems
    Jiang, Haodong
    Han, Jiang
    Zhang, Zhenfeng
    Ma, Zhi
    Wang, Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5069 - 5081
  • [32] Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Roberto Avanzi
    Simon Hoerder
    Dan Page
    Michael Tunstall
    Journal of Cryptographic Engineering, 2012, 2 (1) : 75 - 75
  • [33] ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS
    李大兴
    陆浪如
    李大为
    JournalofElectronics(China), 1994, (04) : 289 - 295
  • [34] Chosen-ciphertext attacks against MOSQUITO
    Joux, Antoine
    Muller, Frederic
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 390 - 404
  • [35] An efficient public key cryptosystem secure against chosen ciphertext attack
    Ghodosi, Hossein
    Information Systems Security, Proceedings, 2006, 4332 : 303 - 314
  • [36] Efficient public-key cryptosystems provably secure against active adversaries
    Paillier, P
    Pointcheval, D
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 165 - 179
  • [37] Public key cryptosystems secure against memory leakage attacks
    Sun, Shi-Feng
    Han, Shuai
    Gu, Dawu
    Liu, Shengli
    IET INFORMATION SECURITY, 2016, 10 (06) : 403 - 412
  • [38] Public-key cryptosystems based on cubic curves
    Koyama, Kenji
    Kuwakado, Hidenori
    Tsuruoka, Yukio
    NTT R and D, 1995, 44 (10): : 91 - 98
  • [39] Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes
    Alain Couvreur
    Philippe Gaborit
    Valérie Gauthier-Umaña
    Ayoub Otmani
    Jean-Pierre Tillich
    Designs, Codes and Cryptography, 2014, 73 : 641 - 666
  • [40] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137