Security of private-key encryption based on array codes

被引:8
|
作者
AlJabri, A
机构
[1] EE Department, College of Engineering, King Saud University, Riyadh 11421
关键词
security of data; codes; cryptography;
D O I
10.1049/el:19961491
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A chosen plaintext attack is presented for constructing all the private keys of cryptosystems based on array codes.
引用
收藏
页码:2226 / 2227
页数:2
相关论文
共 50 条
  • [1] ARRAY CODES FOR PRIVATE-KEY ENCRYPTION
    DESOUZA, RMC
    DESOUZA, JC
    [J]. ELECTRONICS LETTERS, 1994, 30 (17) : 1394 - 1396
  • [2] PRIVATE-KEY ENCRYPTION BASED ON CONCATENATION OF CODES
    ALJABRI, AK
    ALTHUKAIR, F
    MIRZA, A
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 1994, 141 (03): : 105 - 110
  • [3] On private-key encryption using product codes
    Sun, HM
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (06) : 439 - 450
  • [4] Normalized Unconditional ε-Security of Private-Key Encryption
    Bi, Lvqing
    Dai, Songsong
    Hu, Bo
    [J]. ENTROPY, 2017, 19 (03)
  • [5] Characterization of Security Notions for Probabilistic Private-Key Encryption
    Jonathan Katz
    Moti Yung
    [J]. Journal of Cryptology, 2006, 19 : 67 - 95
  • [6] Characterization of security notions for probabilistic private-key encryption
    Katz, J
    Yung, M
    [J]. JOURNAL OF CRYPTOLOGY, 2006, 19 (01) : 67 - 95
  • [7] Private-Key Hidden Vector Encryption with Key Confidentiality
    Blundo, Cailo
    Iovino, Vincenzo
    Persiano, Giuseppe
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 259 - 277
  • [8] Private-Key Fully Homomorphic Encryption for Private Classification
    Wood, Alexander
    Shpilrain, Vladimir
    Najarian, Kayvan
    Mostashari, Ali
    Kahrobaei, Delaram
    [J]. MATHEMATICAL SOFTWARE - ICMS 2018, 2018, 10931 : 475 - 481
  • [9] Function-Private Functional Encryption in the Private-Key Setting
    Brakerski, Zvika
    Segev, Gil
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 306 - 324
  • [10] Function-Private Functional Encryption in the Private-Key Setting
    Zvika Brakerski
    Gil Segev
    [J]. Journal of Cryptology, 2018, 31 : 202 - 225