IMMUNIZING PUBLIC-KEY CRYPTOSYSTEMS AGAINST CHOSEN CIPHERTEXT ATTACKS

被引:30
|
作者
ZHENG, YL
SEBERRY, J
机构
[1] Centre for Computer Security Research, Department of Computer Science, University of Wollongong, Wollongong
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/49.223871
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions, and the third on the use of digitaL signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Security of the three exampLe cryptosystems is formally proved. Two other issues, namely, applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed.
引用
收藏
页码:715 / 724
页数:10
相关论文
共 50 条
  • [41] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [42] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    New Generation Computing, 2005, 23 : 259 - 275
  • [43] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [44] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [45] COMPLEXITY-MEASURES FOR PUBLIC-KEY CRYPTOSYSTEMS
    GROLLMANN, J
    SELMAN, AL
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 309 - 335
  • [46] Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
    Qin, Baodong
    Liu, Shengli
    Chen, Kefei
    IET INFORMATION SECURITY, 2015, 9 (01) : 32 - 42
  • [47] On the implementation of public key cryptosystems against fault-based attacks
    Laih, CS
    Tu, FK
    Lee, YC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (06) : 1082 - 1089
  • [48] On security of XTR public key cryptosystems against side channel attacks
    Han, DG
    Lim, J
    Sakurai, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 454 - 465
  • [49] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434
  • [50] Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
    Couvreur, Alain
    Gaborit, Philippe
    Gauthier-Umana, Valerie
    Otmani, Ayoub
    Tillich, Jean-Pierre
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 641 - 666