메뉴 건너뛰기




Volumn 2567, Issue , 2003, Pages 71-84

Equivalence between semantic security and indistinguishability against chosen ciphertext attacks

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SEMANTICS;

EID: 35248875140     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36288-6_6     Document Type: Article
Times cited : (24)

References (17)
  • 1
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Proceedings of Advances in Cryptology - Eurocrypt 2002, L. Knudsen ed., Springer-Verlag
    • J. H. An, Y. Dodis and T. Rabin, On the security of joint signature and encryption, In Proceedings of Advances in Cryptology - Eurocrypt 2002, Lecture Notes in Computer Science Vol. 2332, L. Knudsen ed., pp. 83-107, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 83-107
    • An, J.H.1    Dodis, Y.2    Rabin, T.3
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • Proceedings of Advances in Cryptology - Crypto '98, H. Krawczyk ed., Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations among notions of security for public-key encryption schemes. In Proceedings of Advances in Cryptology - Crypto '98, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., pp. 26-45, Springer-Verlag, 1998. The latest version is available from http://www-cse.ucsd.edu/users/mihir/
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • Proceedings of Advances in Cryptology - Eurocrypt'94, A. De Santis ed., Springer-Verlag
    • M. Bellare and P. Rogaway, Optimal asymmetric encryption. In Proceedings of Advances in Cryptology - Eurocrypt'94, Lecture Notes in Computer Science Vol. 950, A. De Santis ed., pp. 92-111, Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84957059629 scopus 로고    scopus 로고
    • Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization
    • Proceedings of Advances in Cryptology - Crypto'99, M. Wiener ed., Springer-Verlag
    • M. Bellare and A. Sahai, Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. In Proceedings of Advances in Cryptology - Crypto'99, Lecture Notes in Computer Science Vol. 1666, M. Wiener ed., pp. 519-536, Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 519-536
    • Bellare, M.1    Sahai, A.2
  • 5
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Proceedings of Advances in Cryptology - Crypto'98, H. Krawczyk, ed., Springer-Verlag
    • R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In Proceedings of Advances in Cryptology - Crypto'98, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk, ed., pp. 13-25, Springer-Verlag 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 10
    • 0027306732 scopus 로고
    • A uniform complexity treatment of encryption and zero-knowledge
    • O. Goldreich, A uniform complexity treatment of encryption and zero-knowledge, Journal of Cryptology, Vol. 6, pp. 21-53, 1993.
    • (1993) Journal of Cryptology , vol.6 , pp. 21-53
    • Goldreich, O.1
  • 12
    • 0023985474 scopus 로고
    • The notion of security for probabilistic cryptosystems
    • S. Micali, C. Rackoff and R. Sloan, The notion of security for probabilistic cryptosystems, SIAM Journal on Computing 17, pp. 412-426, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, R.3
  • 14
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Proceedings of Advances in Cryptology - Crypto '91, J. Feigenbaum ed., Springer-Verlag
    • C. Rackoff and D. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, In Proceedings of Advances in Cryptology - Crypto '91, Lecture Notes in Computer Science Vol. 576, J. Feigenbaum ed., pp. 433-444, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 15
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 16
    • 84880904783 scopus 로고    scopus 로고
    • OAEP Reconsidered
    • Proceedings of Advances in Cryptology - Crypto 2001, J. Kilian ed., Springer-Verlag
    • V. Shoup, OAEP Reconsidered, In Proceedings of Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science Vol. 2139, J. Kilian ed., pp. 239-259, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 239-259
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.