메뉴 건너뛰기




Volumn 2947, Issue , 2004, Pages 360-374

On the security of multiple encryption or CCA-security+CCA-security=CCA- security?

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33745822106     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24632-9_26     Document Type: Article
Times cited : (36)

References (36)
  • 1
    • 63449118333 scopus 로고    scopus 로고
    • Flaws in some robust optimistic mix-nets
    • ACISP'03, Springer-Verlag
    • M. Abe and H. Imai. Flaws in some robust optimistic mix-nets. In ACISP'03, volume 2727 of LNCS, pages 39 - 50. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2727 , pp. 39-50
    • Abe, M.1    Imai, H.2
  • 2
    • 84957613967 scopus 로고    scopus 로고
    • Security amplification by composition: The case of doubly-iterated, ideal ciphers
    • Crypto'98, Springer-Verlag
    • B. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan. Security amplification by composition: the case of doubly-iterated, ideal ciphers. In Crypto'98, volume 1462 of LNCS, pages 390-407. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462 , pp. 390-407
    • Aiello, B.1    Bellare, M.2    Di Crescenzo, G.3    Venkatesan, R.4
  • 3
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Eurocrypt'02, Springer-Verlag
    • J.H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Eurocrypt'02, volume 2332 of LNCS, pages 83-107, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 4
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Crypto'98, Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogway. Relations among notions of security for public-key encryption schemes. In Crypto'98, volume 1462 of LNCS. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogway, P.4
  • 5
    • 0035163054 scopus 로고    scopus 로고
    • Composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Composable security: A new paradigm for cryptographic protocols. In 42nd FOCS, pages 136-145, 2001.
    • (2001) 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 6
    • 24944571996 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • R. Canetti, H. Krawczyk, and J. Nielsen. Relaxing chosen-ciphertext security. In Crypto'03. Full version available: http://eprint.iacr.org/2003/174/ , 2003.
    • (2003) Crypto'03
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.3
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return address, and digitalpseudonyms
    • D. Chaum. Untraceable electronic mail, return address, and digitalpseudonyms. Communication of the ACM, 24:84-88, 1981.
    • (1981) Communication of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 8
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • Crypto'89, Springer-Verlag
    • Y. Desmedt and Y. Frankel. Threshold cryptosystems. In Crypto'89, volume 435 of LNCS, pages 307-315. Springer-Verlag, 1989.
    • (1989) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 9
    • 0017501281 scopus 로고
    • Exhaustive cryptananlysis of NBS data encryption standard
    • June
    • W. Diffie and M.E. Hellman. Exhaustive cryptananlysis of NBS data encryption standard. IEEE Computer Magazine, 10(6):74-84, June 1977.
    • (1977) IEEE Computer Magazine , vol.10 , Issue.6 , pp. 74-84
    • Diffie, W.1    Hellman, M.E.2
  • 11
    • 84947254092 scopus 로고    scopus 로고
    • Key-insulated public key cryptosystems
    • Eurocrypt'02, Springer-Verlag
    • Y. Dodis, J. Katz, S. Xu, and M. Yung. Key-insulated public key cryptosystems. In Eurocrypt'02, volume 2332 of LNCS, pages 65-82. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 12
    • 85028450627 scopus 로고
    • Non-malleable cryptography
    • ACM
    • D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography. In 23rd STOC, pages 542-552. ACM, 1991.
    • (1991) 23rd STOC , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 14
    • 84968502759 scopus 로고
    • A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
    • G. Frey and H.G. Rück. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computation, 62(206):865-874, 1994.
    • (1994) Mathematics of Computation , vol.62 , Issue.206 , pp. 865-874
    • Frey, G.1    Rück, H.G.2
  • 18
    • 84958742387 scopus 로고    scopus 로고
    • Optimistic mixing for exit-polls
    • Springer-Verlag
    • P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels. Optimistic mixing for exit-polls. In Asiacrypt'02, volume 2501, pages 451-465. Springer-Verlag, 2002.
    • (2002) Asiacrypt'02 , vol.2501 , pp. 451-465
    • Golle, P.1    Zhong, S.2    Boneh, D.3    Jakobsson, M.4    Juels, A.5
  • 19
    • 84957709438 scopus 로고    scopus 로고
    • A practical mix
    • Eurocrypt'98, Springer-Verlag
    • M. Jakobsson. A practical mix. In Eurocrypt'98, volume 1403 of LNCS, pages 448-461. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1403 , pp. 448-461
    • Jakobsson, M.1
  • 21
    • 84957057937 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems
    • Crypto'99, Springer-Verlag
    • R. Kumar, S. Rajagopalan, and A. Sahai. Coding constructions for blacklisting problems. In Crypto'99, volume 1666 of LNCS, pages 609-623. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 23
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to Igarithms in a finite field
    • A. Menezes, T. Okamoto, and S. Vanstone. Reducing elliptic curve logarithms to Igarithms in a finite field. IEEE Trans. on Information Theory, 39:1639-1646, 1993.
    • (1993) IEEE Trans. on Information Theory , vol.39 , pp. 1639-1646
    • Menezes, A.1    Okamoto, T.2    Vanstone, S.3
  • 24
    • 0019587141 scopus 로고
    • On the security of multiple encryption
    • R. Merkle and M. Hellman. On the security of multiple encryption. Communications of the ACM, 24(7):465-467, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.7 , pp. 465-467
    • Merkle, R.1    Hellman, M.2
  • 25
  • 26
    • 84974554584 scopus 로고
    • Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Crypto'91, Springer-Verlag
    • C. Rackoff and D. Simon. Noninteractive zero-knowledge proof of knowledge and chosen ciphertext attack. In Crypto'91, volume 576 of LNCS, pages 433-444. Springer-Verlag, 1991.
    • (1991) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 27
    • 0343623059 scopus 로고    scopus 로고
    • Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves
    • T. Satoh and K. Araki. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves. Commentarii Mathematici Universitatis Sancti Pauli, (47):81-92, 1998.
    • (1998) Commentarii Mathematici Universitatis Sancti Pauli , Issue.47 , pp. 81-92
    • Satoh, T.1    Araki, K.2
  • 28
    • 0032352723 scopus 로고    scopus 로고
    • Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p
    • I. Semaev. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p. Mathematics of Computation, (67):353-356, 1998.
    • (1998) Mathematics of Computation , Issue.67 , pp. 353-356
    • Semaev, I.1
  • 29
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon. Communication theory of secrecy systems. In Bell System Technical Journal, volume 28, 1949.
    • (1949) Bell System Technical Journal , vol.28
    • Shannon, C.1
  • 30
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • Crypto'01
    • V. Shoup. OAEP reconsidered. In Crypto'01, volume 2139 of LNCS, pages 239-259, 2001.
    • (2001) LNCS , vol.2139 , pp. 239-259
    • Shoup, V.1
  • 32
    • 1842599265 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • V. Shoup and R. Gennaro. Securing threshold cryptosystems against chosen ciphertext attack. Journal of Cryptology, 15(2):75-96, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 75-96
    • Shoup, V.1    Gennaro, R.2
  • 33
    • 0003539458 scopus 로고    scopus 로고
    • The discrete logarithm problems on elliptic curves of trace one
    • N. Smart. The discrete logarithm problems on elliptic curves of trace one. Journal of Cryptology, 12:193-196, 1999.
    • (1999) Journal of Cryptology , vol.12 , pp. 193-196
    • Smart, N.1
  • 34
    • 35248875140 scopus 로고    scopus 로고
    • Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
    • PKC 2003
    • Y. Watanabe, J. Shikata, and H. Imai. Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. In PKC 2003, volume 2567 of LNCS, pages 71-84, 2003.
    • (2003) LNCS , vol.2567 , pp. 71-84
    • Watanabe, Y.1    Shikata, J.2    Imai, H.3
  • 35
    • 35048889420 scopus 로고    scopus 로고
    • Full version of this paper.
    • R. Zhang, G. Hanaoka, J. Shikata, and H. Imai. Full version of this paper. Available at: http://eprint.iacr.org/2003/181/.
    • Zhang, R.1    Hanaoka, G.2    Shikata, J.3    Imai, H.4
  • 36
    • 35048880573 scopus 로고    scopus 로고
    • On the security of multi-layered encryption or CCA-security+CCA-security= CCA-security?
    • January
    • R. Zhang, G. Hanaoka, J. Shikata, and H. Imai. On the security of multi-layered encryption or CCA-security+CCA-security=CCA-security? In SCIS'03, January, 2003.
    • (2003) SCIS'03
    • Zhang, R.1    Hanaoka, G.2    Shikata, J.3    Imai, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.