메뉴 건너뛰기




Volumn 5479 LNCS, Issue , 2009, Pages 313-332

Practical chosen ciphertext secure encryption from factoring

Author keywords

Chosen ciphertext security; Factoring; Public key encryption

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; CHOSEN-CIPHERTEXT SECURITY; CIPHERTEXT; FACTORING; PUBLIC-KEY ENCRYPTION; PUBLIC-KEY ENCRYPTION SCHEME; THE STANDARD MODEL;

EID: 67650677267     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01001-9_18     Document Type: Conference Paper
Times cited : (101)

References (38)
  • 1
    • 0023985196 scopus 로고
    • RSA and Rabin functions: Certain parts are as hard as the whole
    • Alexi, W., Chor, B., Goldreich, O., Schnorr, C.-P.: RSA and Rabin functions: Certain parts are as hard as the whole. SIAM Journal on Computing 17(2), 194-209 (1988)
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.-P.4
  • 2
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • In: Ashby, V. (ed.), ACM Press, New York (1993)
    • Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62-73. ACM Press, New York (1993)
    • (1993) ACM CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • In: De Santis, A. (ed.). LNCS, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.950, pp. 92-111. Springer, Heidelberg (1995)
    • (1995) EUROCRYPT 1994 , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1
    • Advances in Cryptology - CRYPTO '98
    • Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 1-12. Springer, Heidelberg (1998) (Pubitemid 128118993)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 5
    • 0022716288 scopus 로고
    • SIMPLE UNPREDICTABLE PSEUDO-RANDOM NUMBER GENERATOR.
    • Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing 15(2), 364-383 (1986) (Pubitemid 16546557)
    • (1986) SIAM Journal on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Shub, M.2    Blum, M.3
  • 6
    • 84949995981 scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • In: Blakely, G.R., Chaum, D. (eds.) . LNCS, Springer, Heidelberg
    • Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.196, pp. 289-302. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984 , vol.196 , pp. 289-302
    • Blum, M.1    Goldwasser, S.2
  • 7
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850-864 (1984)
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 8
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Springer, Heidelberg, In: Cachin, C., Camenisch, J. L. (eds.). LNCS
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004 , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 9
    • 33745854208 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing 36(5), 915-942 (2006)
    • (2006) SIAM Journal on Computing , vol.36 , Issue.5 , pp. 915-942
    • Boneh, D.1    Canetti, R.2    Halevi, S.3    Katz, J.4
  • 12
    • 4243180376 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. Journal of the ACM 51(4), 557-594 (2004)
    • (2004) Journal of the ACM , vol.51 , Issue.4 , pp. 557-594
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 14
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Springer, Heidelberg, In: Knudsen, L.R. (ed.). LNCS
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002 , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 15
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 16
    • 85028450627 scopus 로고
    • Non-malleable cryptography
    • ACM Press, New York (1991)
    • Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: 23rd ACM STOC, pp. 542-552. ACM Press, New York (1991)
    • (1991) 23rd ACM STOC , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 17
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • DOI 10.1137/S0097539795291562, PII S0097539795291562
    • Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal on Computing 30(2), 391-437 (2000) (Pubitemid 32469583)
    • (2001) SIAM Journal on Computing , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 18
    • 0011189534 scopus 로고    scopus 로고
    • Stronger security proofs for RSA and Rabin bits
    • Fischlin, R., Schnorr, C.-P.: Stronger security proofs for RSA and Rabin bits. Journal of Cryptology 13(2), 221-244 (2000)
    • (2000) Journal of Cryptology , vol.13 , Issue.2 , pp. 221-244
    • Fischlin, R.1    Schnorr, C.-P.2
  • 19
    • 33748310753 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • DOI 10.1145/1151414.1151418
    • Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. ACM Transactions on Information and System Security 9(2), 181-234 (2006) (Pubitemid 44329974)
    • (2006) ACM Transactions on Information and System Security , vol.9 , Issue.2 , pp. 181-234
    • Gennaro, R.1    Lindell, Y.2
  • 21
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • ACM Press, New York (2004)
    • Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: 21st ACM STOC, pp. 25-32. ACM Press, New York (1989)
    • (1989) 21st ACM STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 23
    • 58349116541 scopus 로고    scopus 로고
    • Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption
    • In: Pieprzyk, J. (ed.). LNCS, Springer, Heidelberg (2008)
    • Hanaoka, G., Kurosawa, K.: Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, pp. 308-325. Springer, Heidelberg (2008)
    • (2008) ASIACRYPT 2008 , pp. 308-325
    • Hanaoka, G.1    Kurosawa, K.2
  • 26
    • 38049077895 scopus 로고    scopus 로고
    • Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman
    • In: Okamoto, T., Wang, X. (eds.) . LNCS Springer, Heidelberg (2007)
    • Kiltz, E.: Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.4450, pp. 282- 297. Springer, Heidelberg (2007)
    • (2007) PKC 2007 , vol.4450 , pp. 282-297
    • Kiltz, E.1
  • 27
    • 84870677537 scopus 로고    scopus 로고
    • A new randomness extraction paradigm for hybrid encryption
    • In: Joux, A. (ed.) LNCS. Springer, Heidelberg (2009)
    • Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS. Springer, Heidelberg (2009)
    • (2009) EUROCRYPT 2009
    • Kiltz, E.1    Pietrzak, K.2    Stam, M.3    Yung, M.4
  • 28
    • 35048835796 scopus 로고    scopus 로고
    • A new paradigm of hybrid encryption scheme
    • In: Franklin, M. (ed.). LNCS, Springer, Heidelberg (2004)
    • Kurosawa, K., Desmedt, Y.G.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 426-442. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004 , vol.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.G.2
  • 29
    • 84958742582 scopus 로고    scopus 로고
    • A variant of the cramer-shoup cryptosystem for groups of unknown order
    • In: Zheng, Y. (ed.). LNCS, Springer, Heidelberg (2002)
    • Lucks, S.: A variant of the cramer-shoup cryptosystem for groups of unknown order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.2501, pp. 27-45. Springer, Heidelberg (2002)
    • (2002) ASIACRYPT 2002 , vol.2501 , pp. 27-45
    • Lucks, S.1
  • 30
  • 31
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM Press, New York (1990)
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd ACM STOC. ACM Press, New York (1990)
    • (1990) 22nd ACM STOC
    • Naor, M.1    Yung, M.2
  • 32
    • 77649259271 scopus 로고    scopus 로고
    • Trading one-wayness against chosen-ciphertext security in factoring-based encryption
    • In: Lai, X., Chen, K. (eds.) . LNCS, Springer, Heidelberg (2006)
    • Paillier, P., Villar, J.L.: Trading one-wayness against chosen-ciphertext security in factoring-based encryption. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 252-266. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006 , vol.4284 , pp. 252-266
    • Paillier, P.1    Villar, J.L.2
  • 33
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • In: Ladner, R.E., Dwork, C. (eds.), ACM Press, New York (2008)
    • Peikert, C.,Waters, B.: Lossy trapdoor functions and their applications. In: Ladner, R.E., Dwork, C. (eds.) 40th ACM STOC, pp. 187-196. ACM Press, New York (2008)
    • (2008) 40th ACM STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 35
    • 0003614758 scopus 로고
    • Digital signatures and public key functions as intractable as factorization
    • Massachusetts Institute of Technology (January 1979)
    • Rabin, M.O.: Digital signatures and public key functions as intractable as factorization. Technical Report MIT/LCS/TR-212, Massachusetts Institute of Technology (January 1979)
    • (1979) Technical Report MIT/LCS/TR-212
    • Rabin, M.O.1
  • 36
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • In: Feigenbaum, J. (ed.). LNCS, Springer, Heidelberg (1992)
    • Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) CRYPTO 1991 , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 37
    • 84947431932 scopus 로고    scopus 로고
    • Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
    • In: Batten, L.M., Seberry, J. (eds.) LNCS, Springer, Heidelberg (2002)
    • Reyzin, L., Reyzin, N.: Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol.2384, pp. 144-154. Springer, Heidelberg (2002)
    • (2002) ACISP 2002 , vol.2384 , pp. 144-154
    • Reyzin, L.1    Reyzin, N.2
  • 38
    • 0019080452 scopus 로고
    • MODIFICATION OF THE RSA PUBLIC-KEY ENCRYPTION PROCEDURE.
    • Williams, H.C.: A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory 26(6), 726-729 (1980) (Pubitemid 11460687)
    • (1980) IEEE Transactions on Information Theory , vol.IT-26 , Issue.6 , pp. 726-729
    • Williams, H.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.