메뉴 건너뛰기




Volumn 20, Issue 1, 2007, Pages 3-37

Another look at "provable security"

Author keywords

Cryptography; Provable security; Public key

Indexed keywords

INFORMAL ANALYSIS; MATHEMATICAL PUBLIC; PROVABLE SECURITY; THEOREM PROOF PARADIGM;

EID: 33846856917     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-005-0432-z     Document Type: Article
Times cited : (122)

References (63)
  • 1
    • 35248817849 scopus 로고    scopus 로고
    • The EM side-channel(s)
    • Cryptographic Hardware and Embedded Systems, CHES 2002, Springer-Verlag, Berlin
    • D. Agrawal, B. Archambeault, J. Rao and P. Rohatgi, The EM side-channel(s), Cryptographic Hardware and Embedded Systems - CHES 2002, LNCS 2523, Springer-Verlag, Berlin, 2002, pp. 29-45.
    • (2002) LNCS , vol.2523 , pp. 29-45
    • Agrawal, D.1    Archambeault, B.2    Rao, J.3    Rohatgi, P.4
  • 3
    • 84947928286 scopus 로고    scopus 로고
    • Practice-oriented provable-security
    • Proc. First International Workshop on Information Security ISW '97, Springer-Verlag, Berlin
    • M. Bellare, Practice-oriented provable-security, Proc. First International Workshop on Information Security (ISW '97), LNCS 1396, Springer-Verlag, Berlin, 1998, pp. 221-231.
    • (1998) LNCS , vol.1396 , pp. 221-231
    • Bellare, M.1
  • 4
    • 33846863347 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Cryptology ePrint Archive
    • Report 2003/077
    • M. Bellare, A. Boldyreva and A. Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Cryptology ePrint Archive, Report 2003/077, 2004.
    • (2004)
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 5
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • Advances in Cryptology, Eurocrypt 2004, Springer-Verlag, Berlin
    • M. Bellare, A. Boldyreva and A. Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, Advances in Cryptology - Eurocrypt 2004, LNCS 3027, Springer-Verlag, Berlin, 2004, pp. 171-188.
    • (2004) LNCS , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 7
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption - how to encrypt with RSA
    • Advances in Cryptology, Eurocrypt '94, Springer-Verlag, Berlin
    • M. Bellare and P. Rogaway, Optimal asymmetric encryption - how to encrypt with RSA, Advances in Cryptology - Eurocrypt '94, LNCS 950, Springer-Verlag, Berlin, 1994, pp. 92-111.
    • (1994) LNCS , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures - how to sign with RSA and Rabin
    • Advances in Cryptology, Eurocrypt '96, Springer-Verlag, Berlin
    • M. Bellare and P. Rogaway, The exact security of digital signatures - how to sign with RSA and Rabin, Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, Berlin, 1996, pp. 399-416.
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 33846878938 scopus 로고    scopus 로고
    • Proving tight security for standard Rabin-Williams signatures
    • Preprint
    • D. Bernstein, Proving tight security for standard Rabin-Williams signatures, Preprint, 2003.
    • (2003)
    • Bernstein, D.1
  • 10
    • 84957693225 scopus 로고    scopus 로고
    • D. Bleichenbacher, A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1, Advances in Cryptology - Crypto '98, LNCS 1462, Springer-Verlag, Berlin, 1998, pp. 1-12.
    • D. Bleichenbacher, A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1, Advances in Cryptology - Crypto '98, LNCS 1462, Springer-Verlag, Berlin, 1998, pp. 1-12.
  • 11
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • Five. Third Algorithmic Number Theory Symp, Springer-Verlag, Berlin
    • D. Boneh, The decision Diffie-Hellman problem, Five. Third Algorithmic Number Theory Symp., LNCS 1423, Springer-Verlag, Berlin, 1998, pp. 48-63.
    • (1998) LNCS , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 12
    • 78650941074 scopus 로고    scopus 로고
    • Simplified OAEP for the RSA and Rabin functions
    • Advances in Cryptology, Crypto 2001, Springer-Verlag, Berlin
    • D. Boneh, Simplified OAEP for the RSA and Rabin functions, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 275-291.
    • (2001) LNCS , vol.2139 , pp. 275-291
    • Boneh, D.1
  • 13
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Advances in Cryptology, Eurocrypt '97, Springer-Verlag, Berlin
    • D. Boneh, R. DeMillo and R. Lipton, On the importance of checking cryptographic protocols for faults, Advances in Cryptology - Eurocrypt '97, LNCS 1233, Springer-Verlag, Berlin, 1997, pp. 37-51.
    • (1997) LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 14
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for black-box fields and their application to cryptography
    • Advances in Cryptology, Crypto '96, Springer-Verlag, Berlin
    • D. Boneh and R. Lipton, Algorithms for black-box fields and their application to cryptography, Advances in Cryptology - Crypto '96, LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 283-297.
    • (1996) LNCS , vol.1109 , pp. 283-297
    • Boneh, D.1    Lipton, R.2
  • 15
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • D. Boneh, B. Lynn and H. Shacham, Short signatures from the Weil pairing, J. Cryptology, 17 (2004), 297-319.
    • (2004) J. Cryptology , vol.17 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 16
    • 84957634529 scopus 로고    scopus 로고
    • Breaking RSA may not be equivalent to factoring
    • Advances in Cryptology, Eurocrypt '98, Springer-Verlag, Berlin
    • D. Boneh and R. Venkatesan, Breaking RSA may not be equivalent to factoring, Advances in Cryptology - Eurocrypt '98, LNCS 1233, Springer-Verlag, Berlin, 1998, pp. 59-71.
    • (1998) LNCS , vol.1233 , pp. 59-71
    • Boneh, D.1    Venkatesan, R.2
  • 17
    • 85028916857 scopus 로고
    • Responses to comments on the NIST proposed digital signature standard
    • Advances in Cryptology, Crypto '92, Springer-Verlag, Berlin
    • D. Branstad and M. Smid, Responses to comments on the NIST proposed digital signature standard, Advances in Cryptology - Crypto '92, LNCS 740, Springer-Verlag, Berlin, 1993, pp. 76-88.
    • (1993) LNCS , vol.740 , pp. 76-88
    • Branstad, D.1    Smid, M.2
  • 20
    • 84947924912 scopus 로고    scopus 로고
    • Finding a small root of a univariate modular equation
    • Advances in Cryptology Eurocrypt '96, Springer-Verlag, Berlin
    • D. Coppersmith, Finding a small root of a univariate modular equation, Advances in Cryptology Eurocrypt '96, LNCS 1070. Springer-Verlag, Berlin, 1996, pp. 155-165.
    • (1996) LNCS , vol.1070 , pp. 155-165
    • Coppersmith, D.1
  • 21
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Advances in Cryptology, Crypto 2000, Springer-Verlag, Berlin
    • J.-S. Coron, On the exact security of full domain hash, Advances in Cryptology - Crypto 2000, LNCS 1880, Springer-Verlag, Berlin, 2000, pp. 229-235.
    • (2000) LNCS , vol.1880 , pp. 229-235
    • Coron, J.-S.1
  • 22
    • 84947215491 scopus 로고    scopus 로고
    • Optimal security proofs for PSS and other signature schemes
    • Advances in Cryptology Eurocrypt 2002, Springer-Verlag, Berlin
    • J.-S. Coron, Optimal security proofs for PSS and other signature schemes, Advances in Cryptology Eurocrypt 2002, LNCS 2332, Springer-Verlag, Berlin, 2002, pp. 272-287.
    • (2002) LNCS , vol.2332 , pp. 272-287
    • Coron, J.-S.1
  • 23
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Advances in Cryptology, Crypto '98, Springer-Verlag, Berlin
    • R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, Advances in Cryptology - Crypto '98, LNCS 1462, Springer-Verlag, Berlin, 1998, pp. 13-25.
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 25
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, IT-31 (1985), 469-472.
    • (1985) IEEE Trans. Inform. Theory , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 26
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Advances in Cryptology, Crypto '86, Springer-Verlag, Berlin
    • A. Fiat and A. Shamir, How to prove yourself: practical solutions to identification and signature problems, Advances in Cryptology - Crypto '86, LNCS 263, Springer-Verlag, Berlin, 1987, pp. 186-194.
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 27
    • 84880853825 scopus 로고    scopus 로고
    • RSA-OAEP is secure under the RSA assumption
    • Advances in Cryptology, Crypto 2001, Springer-Verlag, Berlin
    • E. Fujisaki, T. Okamoto, D. Pointcheval and J. Stern, RSA-OAEP is secure under the RSA assumption, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 260-274.
    • (2001) LNCS , vol.2139 , pp. 260-274
    • Fujisaki, E.1    Okamoto, T.2    Pointcheval, D.3    Stern, J.4
  • 29
    • 35248836947 scopus 로고    scopus 로고
    • A signature scheme as secure as the Diffie-Hellman problem
    • Advances in Cryptology, Eurocrypt 2003, Springer-Verlag, Berlin
    • E. Goh and S. Jarecki, A signature scheme as secure as the Diffie-Hellman problem, Advances in Cryptology - Eurocrypt 2003, LNCS 2656, Springer-Verlag, Berlin, 2003, pp. 401-415.
    • (2003) LNCS , vol.2656 , pp. 401-415
    • Goh, E.1    Jarecki, S.2
  • 31
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all
    • partial information, ACM, New York
    • S. Goldwasser and S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information, Proc. 14th Annual Symp. Theory of Computing, ACM, New York, 1982, pp. 365-377.
    • (1982) Proc. 14th Annual Symp. Theory of Computing , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 34
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, SIAM J. Comput., 17 (1988), 281-308.
    • (1988) SIAM J. Comput , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 36
    • 33846866029 scopus 로고    scopus 로고
    • On the (in)security of the Fiat-Shamir paradigm, Cryptology ePrint Archive
    • Report 2003/034
    • S. Goldwasser and Y. Tauman, On the (in)security of the Fiat-Shamir paradigm, Cryptology ePrint Archive, Report 2003/034, 2003.
    • (2003)
    • Goldwasser, S.1    Tauman, Y.2
  • 37
    • 21144454271 scopus 로고    scopus 로고
    • Separating Decision Diffie-Hellman from Computational Diffie-Hellman in cryptographic groups
    • A. Joux and K. Nguyen, Separating Decision Diffie-Hellman from Computational Diffie-Hellman in cryptographic groups, J. Cryptology, 16 (2003), 239-247.
    • (2003) J. Cryptology , vol.16 , pp. 239-247
    • Joux, A.1    Nguyen, K.2
  • 40
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Advances in Cryptology, Crypto '96, Springer-Verlag, Berlin
    • P. Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Advances in Cryptology - Crypto '96, LNCS 1109, Springer-Verlag, Berlin, 1996, pp. 104-113.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 41
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Advances in Cryptology, Crypto '99, Springer-Verlag, Berlin
    • P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Advances in Cryptology - Crypto '99, LNCS 1666, Springer-Verlag, Berlin, 1999, pp. 388-397.
    • (1999) LNCS 1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 42
    • 33846862428 scopus 로고    scopus 로고
    • Advances in Cryptology - Crypto
    • A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0, Springer-Verlag, Berlin
    • J. Manger, A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 230-238.
    • (2001) LNCS , vol.2139 , pp. 230-238
    • Manger, J.1
  • 43
    • 84947597805 scopus 로고
    • Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
    • Advances in Cryptology, Crypto '94, Springer-Verlag, Berlin
    • U. Maurer, Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms, Advances in Cryptology - Crypto '94, LNCS 839, Springer-Verlag, Berlin, 1994, pp. 271-281.
    • (1994) LNCS , vol.839 , pp. 271-281
    • Maurer, U.1
  • 44
    • 0032621240 scopus 로고    scopus 로고
    • The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
    • U. Maurer and S. Wolf, The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms, SIAM J. Comput., 28(5) (1999), 1689-1731.
    • (1999) SIAM J. Comput , vol.28 , Issue.5 , pp. 1689-1731
    • Maurer, U.1    Wolf, S.2
  • 46
    • 0023985474 scopus 로고
    • The notion of security for probabilistic cryptosystems
    • S. Micali, C. Rackoff and B. Sloan, The notion of security for probabilistic cryptosystems, SIAM J. Comput., 17 (1988), 412-426.
    • (1988) SIAM J. Comput , vol.17 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, B.3
  • 48
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM, New York
    • M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, Proc. 22nd Annual Symp. Theory of Computing, ACM, New York, 1990, pp. 427-437.
    • (1990) Proc. 22nd Annual Symp. Theory of Computing , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 49
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Advances in Cryptology, Eurocrypt '96, Springer-Verlag, Berlin
    • D. Pointcheval and J. Stern, Security proofs for signature schemes, Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, Berlin, 1996, pp. 387-398.
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 50
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, J. Cryptology, 13 (2000), 361-396.
    • (2000) J. Cryptology , vol.13 , pp. 361-396
    • Pointcheval, D.1    Stern, J.2
  • 51
    • 0003614758 scopus 로고    scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization
    • Technical Report LCS/TR-212, MIT Lab. for Computer Science, 1979
    • M. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report LCS/TR-212, MIT Lab. for Computer Science, 1979.
    • Rabin, M.1
  • 52
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Advances in Cryptology, Crypto '91, Springer-Verlag, Berlin
    • C. Rackoff and D. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, Advances in Cryptology - Crypto '91, LNCS 576, Springer-Verlag, Berlin, 1992, pp. 433-444.
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 53
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Commun. ACM, 21(2) (1978), 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 55
    • 12344258539 scopus 로고
    • Efficient signature generation for smart cards
    • C. P. Schnorr, Efficient signature generation for smart cards, J. Cryptology, 4 (1991), 161-174.
    • (1991) J. Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 56
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attack
    • Advances in Cryptology, Eurocrypt 2000, Springer-Verlag, Berlin
    • V. Shoup, Using hash functions as a hedge against chosen ciphertext attack, Advances in Cryptology - Eurocrypt 2000, LNCS 1807, Springer-Verlag, Berlin, 2000, pp. 275-288.
    • (2000) LNCS , vol.1807 , pp. 275-288
    • Shoup, V.1
  • 57
    • 84880904783 scopus 로고    scopus 로고
    • Advances in Cryptology - Crypto 2001
    • Springer-Verlag, Berlin
    • V. Shoup, OAEP reconsidered, Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, Berlin, 2001, pp. 239-259.
    • (2001) LNCS , vol.2139 , pp. 239-259
    • Shoup, V.1    reconsidered, O.A.E.P.2
  • 58
    • 35248867842 scopus 로고    scopus 로고
    • Why provable security matters
    • Advances in Cryptology, Eurocrypt 2003, Springer-Verlag, Berlin
    • J. Stern, Why provable security matters, Advances in Cryptology - Eurocrypt 2003, LNCS 2656, Springer-Verlag, Berlin, 2003, pp. 449-461.
    • (2003) LNCS , vol.2656 , pp. 449-461
    • Stern, J.1
  • 59
    • 84937411969 scopus 로고    scopus 로고
    • Flaws in applying proof methodologies to signature schemes
    • Advances in Cryptology, Crypto 2002, Springer- Verlag, Berlin
    • J. Stern, D. Pointcheval, J. Malone-Lee and N. Smart, Flaws in applying proof methodologies to signature schemes, Advances in Cryptology - Crypto 2002, LNCS 2442, Springer- Verlag, Berlin, 2002, pp. 93-110.
    • (2002) LNCS , vol.2442 , pp. 93-110
    • Stern, J.1    Pointcheval, D.2    Malone-Lee, J.3    Smart, N.4
  • 60
    • 0000674810 scopus 로고
    • Ring-theoretic properties of certain Hecke algebras
    • R. Taylor and A. Wiles, Ring-theoretic properties of certain Hecke algebras, Ann. of Math., 141 (1995), 553-572.
    • (1995) Ann. of Math , vol.141 , pp. 553-572
    • Taylor, R.1    Wiles, A.2
  • 61
    • 35248875140 scopus 로고    scopus 로고
    • Equivalence between semantic security and indistinguishability against chosen ciphertext attacks
    • Public Key Cryptography, PKC 2003, Springer-Verlag, Berlin
    • Y. Watanabe, J. Shikata and H. Imai, Equivalence between semantic security and indistinguishability against chosen ciphertext attacks, Public Key Cryptography - PKC 2003, LNCS 2567, Springer-Verlag, Berlin, 2003, pp. 71-84.
    • (2003) LNCS , vol.2567 , pp. 71-84
    • Watanabe, Y.1    Shikata, J.2    Imai, H.3
  • 62
    • 0000603921 scopus 로고
    • Modular elliptic curves and Fermat's Last Theorem
    • A. Wiles, Modular elliptic curves and Fermat's Last Theorem, Ann. of Math., 141 (1995), 443-551.
    • (1995) Ann. of Math , vol.141 , pp. 443-551
    • Wiles, A.1
  • 63
    • 0019080452 scopus 로고
    • A modification of the RSA public-key encryption procedure
    • H. Williams, A modification of the RSA public-key encryption procedure, IEEE Trans. Inform. Theory, IT-26 (1980), 726-729.
    • (1980) IEEE Trans. Inform. Theory , vol.IT-26 , pp. 726-729
    • Williams, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.