메뉴 건너뛰기




Volumn 22, Issue 4, 2000, Pages 25-31

Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; COMPUTER SYSTEM FIREWALLS; DATA PRIVACY; SECURITY OF DATA;

EID: 0034513604     PISSN: 12256463     EISSN: None     Source Type: Journal    
DOI: 10.4218/etrij.00.0100.0403     Document Type: Article
Times cited : (10)

References (17)
  • 1
    • 33745860457 scopus 로고    scopus 로고
    • DHAES: An encryption scheme based on Diffie-Hellman problem
    • M. Abdalla, M. Bellare, and P.Rogaway, "DHAES: An Encryption Scheme Based on Diffie-Hellman Problem," IEEE P1363a Submission, 1998, Available at http://grouper.ieee.org/groups/1363/ addendum.html.
    • (1998) IEEE P1363a Submission
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 7
    • 0032635116 scopus 로고    scopus 로고
    • Scalar multiplication on elliptic curves by frobenius expansions
    • March
    • J. Cheon, S. Park, C. Park, and S. Hahn, "Scalar Multiplication on Elliptic Curves by Frobenius Expansions," ETRI J., Vol. 21, No. 1, March 1999, pp. 27-38.
    • (1999) ETRI J. , vol.21 , Issue.1 , pp. 27-38
    • Cheon, J.1    Park, S.2    Park, C.3    Hahn, S.4
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Springer-Verlag
    • R. Cramer and V. Shoup, "A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack," In Advances in Cryptology - Proceedings of Crypto '98, LNCS 1462, Springer-Verlag, 1998, pp. 13-25.
    • (1998) In Advances in Cryptology - Proceedings of Crypto '98, LNCS 1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystems and a signature schems based on discrete logarithms
    • T. ElGamal, "A Public Key Cryptosystems and a Signature Schems Based on Discrete Logarithms," IEEE Transactions on Information Theory, IT-31(4), 1985, pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 12
    • 84956859011 scopus 로고    scopus 로고
    • How to enhance the security of public-key encryption at minimum cost
    • Springer-Verlag
    • E. Fujisaki and T. Okamoto, "How to Enhance the Security of Public-key Encryption at Minimum Cost," PKC '99, LNCS 1560, Springer-Verlag, 1999, pp. 53-68.
    • (1999) PKC '99, LNCS 1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 15
    • 84957795480 scopus 로고    scopus 로고
    • Chosen-ciphertext security for any one-way cryptosystem
    • Springer-Verlag
    • D. Pointcheval, "Chosen-ciphertext Security for any One-way Cryptosystem," PKC '2000, LNCS 1751, Springer-Verlag, 2000, pp. 129-146.
    • (2000) PKC '2000, LNCS 1751 , pp. 129-146
    • Pointcheval, D.1
  • 16
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal based encryption
    • Springer-Verlag
    • Y. Tsiounis and M. Yung, "On the Security of ElGamal Based Encryption," PKC '98, LNCS 1431, Springer-Verlag, 1998, pp.117-134.
    • (1998) PKC '98, LNCS 1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 17
    • 85028933312 scopus 로고
    • Practical approaches to attaining security against adaptively chosen ciphertext attacks
    • Springer-Verlag
    • Y. Zheng and J. Seberry, "Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks," In Advances in Cryptology - Proceedings of Crypto '92, LNCS 740, Springer-Verlag, 1993, pp. 292-304.
    • (1993) In Advances in Cryptology - Proceedings of Crypto '92, LNCS 740 , pp. 292-304
    • Zheng, Y.1    Seberry, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.