메뉴 건너뛰기




Volumn 3378, Issue , 2005, Pages 529-555

Proof of plaintext knowledge for the Ajtai-Dwork cryptosystem

Author keywords

Ajtai Dwork Cryptosystem; Lattices; Proof of Plaintext Knowledge; Verifiable Encryption; Worst Case Complexity Assumption

Indexed keywords

KNOWLEDGE ACQUISITION; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; VECTORS;

EID: 24144466362     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30576-7_29     Document Type: Conference Paper
Times cited : (13)

References (26)
  • 1
    • 77955907421 scopus 로고    scopus 로고
    • A public-key cryptosystem with worst-case/Average-case equivalence
    • Dec.
    • M. Ajtai and C. Dwork. A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence. ECCC, TR96-065, Dec. 1996.
    • (1996) ECCC, TR96-065
    • Ajtai, M.1    Dwork, C.2
  • 2
    • 84957616594 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • N. Asokan, V. Shoup, M. Waidner. Optimistic Fair Exchange of Digital Signatures (Extended Abstract). EUROCRYPT 1998: 591-606
    • (1998) EUROCRYPT , pp. 591-606
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 3
    • 0006578697 scopus 로고    scopus 로고
    • Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation
    • M. Bellare and M. Yung, Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation J. Cryptology 9(3): 149-166 (1996)
    • (1996) J. Cryptology , vol.9 , Issue.3 , pp. 149-166
    • Bellare, M.1    Yung, M.2
  • 4
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
    • J. Camenisch and I. Damgard Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. ASI-ACRYPT 2000: 331-345
    • (2000) ASI-ACRYPT , pp. 331-345
    • Camenisch, J.1    Damgard, I.2
  • 5
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • J. Camenisch and V. Shoup. Practical Verifiable Encryption and Decryption of Discrete Logarithms. CRYPTO 2003: 126-144
    • (2003) CRYPTO , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 7
    • 0346180997 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public key encryption
    • R. Cramer, V. Shoup. Universal Hash Proofs and a paradigm for adaptive chosen ciphertext secure public key encryption. Eurocrypt 2002.
    • (2002) Eurocrypt
    • Cramer, R.1    Shoup, V.2
  • 8
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • D. Dolev, C. Dwork, M. Naor: Nonmalleable Cryptography. SIAM J. Comput. 30(2): 391-437 (2000)
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 10
    • 33645603848 scopus 로고    scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm
    • T. ElGamal. A Public Key Cryptosystem and a signature scheme based on discrete logarithm. Proceedings of Crypto 84.
    • Proceedings of Crypto , vol.84
    • ElGamal, T.1
  • 11
    • 0342733642 scopus 로고    scopus 로고
    • Multiple noninteractive zero knowledge proofs under general assumptions
    • U. Feige, D. Lapidot, A. Shamir: Multiple Noninteractive Zero Knowledge Proofs Under General Assumptions. SIAM J. Comput. 29(1): 1-28 (1999)
    • (1999) SIAM J. Comput. , vol.29 , Issue.1 , pp. 1-28
    • Feige, U.1    Lapidot, D.2    Shamir, A.3
  • 13
    • 85034643663 scopus 로고
    • Symmetric public-key encryption
    • Zvi Galil, Stuart Haber, Moti Yung. Symmetric Public-Key Encryption. CRYPTO 1985: 128-137
    • (1985) CRYPTO , pp. 128-137
    • Galil, Z.1    Haber, S.2    Yung, M.3
  • 14
    • 0034205405 scopus 로고    scopus 로고
    • On the limits of nonapproximability of lattice problems
    • O. Goldreich, S. Goldwasser. On the Limits of Nonapproximability of Lattice Problems. JCSS 60(3): 540-563 (2000)
    • (2000) JCSS , vol.60 , Issue.3 , pp. 540-563
    • Goldreich, O.1    Goldwasser, S.2
  • 17
    • 33645599872 scopus 로고    scopus 로고
    • Proofs that yield nothing but their validity or NP in zero knowledge
    • O. Goldreich, S. Micali, and A. Wigderon. Proofs that Yield Nothing but their Validity or NP in Zero Knowledge. JACM 91.
    • JACM 91
    • Goldreich, O.1    Micali, S.2    Wigderon, A.3
  • 20
    • 33645605199 scopus 로고    scopus 로고
    • Efficient and non-malleable proofs of plaintext knowledge and applications
    • Jonathan Katz. Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications. Eurocrypt 2003.
    • (2003) Eurocrypt
    • Katz, J.1
  • 21
    • 2942753683 scopus 로고    scopus 로고
    • Statistical zero-knowledge proofs with efficient provers: Lattice problems and more
    • Santa Barbara, CA, USA, August LNCS 2729, Springer
    • D. Micciancio and S. Vadhan. Statistical zero-knowledge proofs with efficient provers: lattice problems and more. Advances in Cryptology - Crypto 2003. Santa Barbara, CA, USA, August 2003. LNCS 2729, Springer.
    • (2003) Advances in Cryptology - Crypto 2003
    • Micciancio, D.1    Vadhan, S.2
  • 22
    • 0024983231 scopus 로고
    • Public-Key cryptosystems provably secure against chosen ciphertext attacks
    • May 13-17, Baltimore, Maryland, United States
    • M. Naor, M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing, p.427-437, May 13-17, 1990, Baltimore, Maryland, United States
    • (1990) Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 23
    • 84957660976 scopus 로고    scopus 로고
    • Cryptanalysis of the Ajtai-Dwork cryptosystem
    • Advances in Cryptology: Proceedings of Crypto '98, Springer-Verlag
    • P. Nguyen and J. Stern. Cryptanalysis of the Ajtai-Dwork cryptosystem. In Advances in Cryptology: Proceedings of Crypto '98, volume 1462 of Lecture Notes in Computer Science, pages 223-242. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 223-242
    • Nguyen, P.1    Stern, J.2
  • 25
    • 0017930809 scopus 로고
    • Public key cryptography
    • R. L. Rivest, A. Shamir, L. Adleman Public key cryptography, CACM 21, 120-126, 1978.
    • (1978) CACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 26
    • 84947917119 scopus 로고    scopus 로고
    • Publicly verifiable secret sharing
    • M. Stadler. Publicly Verifiable Secret Sharing. EUROCRYPT 1996: 190-199
    • (1996) EUROCRYPT , pp. 190-199
    • Stadler, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.