메뉴 건너뛰기




Volumn 2951, Issue , 2004, Pages 152-170

Rerandomizable and replayable adaptive chosen ciphertext attack secure cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 35048856555     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24638-1_9     Document Type: Article
Times cited : (35)

References (15)
  • 1
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable cryptography
    • Earlier version at STOC '91
    • Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. SIAM J. of Computing 30 (2000) 391-437 Earlier version at STOC '91.
    • (2000) SIAM J. of Computing , vol.30 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 2
    • 0033342534 scopus 로고    scopus 로고
    • Non-malleable non-interactive zero-knowledge and adaptive chosenciphertext security
    • Sahai, A.: Non-malleable non-interactive zero-knowledge and adaptive chosenciphertext security. In: proceedings of FOCS '01. (2001) 543-553
    • (2001) Proceedings of FOCS '01 , pp. 543-553
    • Sahai, A.1
  • 3
    • 84870707379 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • LNCS series
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. In: proceedings of CRYPTO '98, LNCS series, volume 1462. (1998) 13-25
    • (1998) Proceedings of Crypto '98 , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 4
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: proceedings of EUROCRYPT '02, LNCS series, volume 2332. (2002) 45-64
    • (2002) Proceedings of Eurocrypt '02, Lncs Series , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 5
    • 35248840513 scopus 로고    scopus 로고
    • A simpler construction of cca2-secure public-key encryption under general assumptions
    • Lindell, Y.: A simpler construction of cca2-secure public-key encryption under general assumptions. In: proceedings of EUROCRYPT '03, LNCS series, volume 2656. (2003) 241-254
    • (2003) ProceedIngs Of Eurocrypt '03, Lncs Series , vol.2656 , pp. 241-254
    • Lindell, Y.1
  • 6
    • 17144422244 scopus 로고    scopus 로고
    • A proposal for an iso standard for public key encryption
    • Shoup, V.: A proposal for an iso standard for public key encryption. Cryptology ePrint Archive, Report 2001/112 (2001) http://eprint.iacr.org/2001/ 212.
    • (2001) Cryptology EPrint Archive, Report 2001/112
    • Shoup, V.1
  • 9
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs 1
    • Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs 1. In: proceedings of CRYPTO '98, LNCS series, volume 1462. (1998) 1-12
    • (1998) Proceedings of CRYPTO '98, LNCS Series , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 10
    • 84957059629 scopus 로고    scopus 로고
    • Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization
    • Bellare, M., Sahai, A.: Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. In: proceedings of CRYPTO '99, LNCS series, volume 1666. (1999) 519-536
    • (1999) Proceedings of CRYPTO '99, LNCS Series , vol.1666 , pp. 519-536
    • Bellare, M.1    Sahai, A.2
  • 11
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for black-box fields and their application to cryptography
    • Boneh, D., Lipton, R.J.: Algorithms for black-box fields and their application to cryptography. In: proceedings of CRYPTO '96, LNCS series, volume 1109. (1996) 283-297
    • (1996) Proceedings of Crypto '96, Lncs Series , vol.1109 , pp. 283-297
    • Boneh, D.1    Lipton, R.J.2
  • 12
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Shoup, V.: Lower bounds for discrete logarithms and related problems. In: proceedings of EUROCRYPT '97, LNCS series, volume 1233. (1997) 256-266
    • (1997) Proceedings of Eurocrypt '97, Lncs Series , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 13
    • 84947214473 scopus 로고    scopus 로고
    • Generic lower bounds for root extraction and signature schemes in general groups
    • Damgård, I., Koprowski, M.: Generic lower bounds for root extraction and signature schemes in general groups. In: proceedings of EUROCRYPT '02, LNCS series, volume 2332. (2002) 256-271
    • (2002) Proceedings of Eurocrypt '02, Lncs Series , vol.2332 , pp. 256-271
    • Damgård, I.1    Koprowski, M.2
  • 14
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: proceedings of STOC '90. (1990) 427-437
    • (1990) Proceedings of STOC '90 , pp. 427-437
    • Naor, M.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.