메뉴 건너뛰기




Volumn 5479 LNCS, Issue , 2009, Pages 351-368

A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

Author keywords

[No Author keywords available]

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; CHOSEN-PLAINTEXT ATTACK; CONSTANT FACTORS; ENCRYPTION SCHEMES; NON-INTERACTIVE; OPEN PROBLEMS; PLAINTEXT; PROOF SYSTEM; PUBLIC-KEY ENCRYPTION SCHEME; RANDOM ORACLE; STANDARD ASSUMPTIONS; ZERO KNOWLEDGE PROOF;

EID: 67650691588     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01001-9_20     Document Type: Conference Paper
Times cited : (109)

References (38)
  • 1
    • 58349093204 scopus 로고    scopus 로고
    • OAEP is secure under key-dependent messages
    • In: Pieprzyk,J. (ed.). LNCS, Springer, Heidelberg (2008)
    • Backes, M., Dürmuth, M., Unruh, D.: OAEP is secure under key-dependent messages. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.5350, pp. 506-523. Springer, Heidelberg (2008)
    • (2008) ASIACRYPT 2008 , vol.5350 , pp. 506-523
    • Backes, M.1    Dürmuth, M.2    Unruh, D.3
  • 2
    • 35048877673 scopus 로고    scopus 로고
    • Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles
    • DOI 10.1109/CSF.2007.23, 4271644, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
    • Backes, M., Pfitzmann, B., Scedrov, A.: Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles. In: CSF, pp. 112-124 (2007) (Pubitemid 47554209)
    • (2007) Proceedings - IEEE Computer Security Foundations Symposium , pp. 112-124
    • Backes, M.1    Pfitzmann, B.2    Scedrov, A.3
  • 3
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • In: Preneel, B. (ed.). LNCS, Springer, Heidelberg (2000)
    • Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: Security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.1807, pp. 259-274. Springer, Heidelberg (2000)
    • (2000) EUROCRYPT 2000 , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 4
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • In: De Santis,A. (ed.). LNCS, Springer, Heidelberg (1995)
    • Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.950, pp. 92-111. Springer, Heidelberg (1995)
    • (1995) EUROCRYPT 1994 , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme security in the presence of key-dependent messages
    • Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Selected Areas in Cryptography, pp. 62-75 (2002)
    • (2002) Selected Areas in Cryptography , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 7
    • 0003153237 scopus 로고
    • Non-interactive zero-knowledge and its applications (extended abstract)
    • Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: STOC 1988, pp. 103-112 (1988)
    • (1988) STOC 1988 , pp. 103-112
    • Blum, M.1    Feldman, P.2    Micali, S.3
  • 8
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • In: Franklin, M. (ed.). LNCS, Springer, Heidelberg (2004)
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004 , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 9
    • 51849118137 scopus 로고    scopus 로고
    • Circular-secure encryption from decision diffie-hellman
    • In: Wagner, D. (ed.). LNCS, Springer, Heidelberg (2008)
    • Boneh, D., Halevi, S., Hamburg,M., Ostrovsky, R.: Circular-secure encryption from decision diffie-hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.5157, pp. 108-125. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008 , vol.5157 , pp. 108-125
    • Boneh, D.1    Halevi, S.2    Hamburg, M.3    Ostrovsky, R.4
  • 10
    • 84869520399 scopus 로고    scopus 로고
    • A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
    • Camenisch, J., Chandran, N., Shoup, V.: A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. Cryptology ePrint Archive, Report 2008/375 (2008), http://eprint.iacr. org/
    • (2008) Cryptology ePrint Archive, Report 2008/375
    • Camenisch, J.1    Chandran, N.2    Shoup, V.3
  • 11
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.2045, pp. 93-118. Springer, Heidelberg (2001) (Pubitemid 33275827)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • Advances in Cryptology - CRYPTO '98
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 14
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • In: Knudsen, L.R. (ed.). LNCS, Springer, Heidelberg (2002)
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.2332, p. 45. Springer, Heidelberg (2002), http://eprint.iacr.org/2001/085
    • (2002) EUROCRYPT 2002 , vol.2332 , pp. 45
    • Cramer, R.1    Shoup, V.2
  • 15
    • 85028450627 scopus 로고
    • Non-malleable cryptography (extended abstract)
    • Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: STOC 1991, pp. 542-552 (1991)
    • (1991) STOC 1991 , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 16
    • 0025855536 scopus 로고
    • Multiple non-interactive zero knowledge proofs based on a single random string (extended abstract)
    • Feige, U., Lapidot, D., Shamir, A.: Multiple non-interactive zero knowledge proofs based on a single random string (extended abstract). In: FOCS 1990, pp. 308-317 (1990)
    • (1990) FOCS 1990 , pp. 308-317
    • Feige, U.1    Lapidot, D.2    Shamir, A.3
  • 17
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: STOC 1982, pp. 365-377 (1982)
    • (1982) STOC 1982 , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 18
    • 77649262306 scopus 로고    scopus 로고
    • Simulation-sound NIZK proofs for a practical language and constant size group signatures
    • In: Lai, X., Chen, K. (eds.). LNCS, Springer, Heidelberg (2006)
    • Groth, J.: Simulation-sound NIZK proofs for a practical language and constant size group signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 444-459. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006 , vol.4284 , pp. 444-459
    • Groth, J.1
  • 21
    • 67650679185 scopus 로고    scopus 로고
    • On the (im)possibility of key dependent encryption
    • Haitner, I., Holenstein, T.: On the (im)possibility of key dependent encryption. In: TCC 2009 (2009)
    • (2009) TCC 2009
    • Haitner, I.1    Holenstein, T.2
  • 23
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • In: Menezes, A. (ed.). LNCS, Springer, Heidelberg (2007)
    • Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 553-571. Springer, Heidelberg (2007)
    • (2007) CRYPTO 2007 , vol.4622 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 27
    • 38049077895 scopus 로고    scopus 로고
    • Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman
    • In: Okamoto, T., Wang, X. (eds.). LNCS, Springer, Heidelberg (2007)
    • Kiltz, E.: Chosen-ciphertext secure key-encapsulation based on gap hashed diffiehellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.4450, pp. 282- 297. Springer, Heidelberg (2007)
    • (2007) PKC 2007 , vol.4450 , pp. 282-297
    • Kiltz, E.1
  • 28
    • 84937578837 scopus 로고
    • Another method for attaining security against adaptively chosen ciphertext attacks
    • In: Stinson, D.R. (ed.). LNCS, Springer, Heidelberg (1994)
    • Lim, C.H., Lee, P.J.: Another method for attaining security against adaptively chosen ciphertext attacks. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.773, pp. 420-434. Springer, Heidelberg (1994)
    • (1994) CRYPTO 1993 , vol.773 , pp. 420-434
    • Lim, C.H.1    Lee, P.J.2
  • 29
    • 30744458170 scopus 로고    scopus 로고
    • Alternatives to Non-malleability: Definitions, Constructions, and Applications
    • Theory of Cryptography First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings
    • MacKenzie, P.D., Reiter, M.K., Yang, K.: Alternatives to non-malleability: Definitions, constructions, and applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol.2951, pp. 171-190. Springer, Heidelberg (2004) (Pubitemid 38236625)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2951 , pp. 171-190
    • MacKenzie, P.1    Reiter, M.K.2    Yang, K.3
  • 30
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: STOC 1990, pp. 427-437 (1990) (Pubitemid 20729148)
    • (1990) STOC 1990 , pp. 427-437
    • Naor Moni1    Yung Moti2
  • 31
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • In: Feigenbaum, J. (ed.). LNCS, Springer, Heidelberg (1992)
    • Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) CRYPTO 1991 , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 35
    • 84880875026 scopus 로고    scopus 로고
    • Robust noninteractive zero knowledge
    • In: Kilian, J. (ed.) . LNCS, Springer, Heidelberg (2001)
    • De Santis, A., Di Crescenzo, G., Ostrovsky, R., Persiano, G., Sahai, A.: Robust noninteractive zero knowledge. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.2139, pp. 566-598. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001 , vol.2139 , pp. 566-598
    • Santis, D.A.1    Crescenzo, D.G.2    Ostrovsky, R.3    Persiano, G.4    Sahai, A.5
  • 36
    • 38049124394 scopus 로고    scopus 로고
    • A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants
    • Shacham, H.: A Cramer-Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007/074 (2007), http://eprint.iacr.org/
    • (2007) Cryptology ePrint Archive, Report 2007/074
    • Shacham, H.1
  • 38
    • 84888872516 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • Advances in Cryptology - EUROCRYPT '98
    • Shoup, V., Gennaro, R.: Securing threshold cryptosystems against chosen ciphertext attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.1403, pp. 1-16. Springer, Heidelberg (1998) (Pubitemid 128081472)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1403 , pp. 1-16
    • Shoup, V.1    Gennaro, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.