메뉴 건너뛰기




Volumn 7293 LNCS, Issue , 2012, Pages 262-279

Public key encryption against related key attacks

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; ENCRYPTION SCHEMES; LINEAR-SHIFT; PUBLIC-KEY ENCRYPTION; PUBLIC-KEY ENCRYPTION SCHEME; RELATED KEY ATTACKS; SECRET KEY; STANDARD ASSUMPTIONS; THE STANDARD MODEL;

EID: 84861714606     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-30057-8_16     Document Type: Conference Paper
Times cited : (78)

References (42)
  • 1
    • 77954625601 scopus 로고    scopus 로고
    • Efficient Lattice (H)IBE in the Standard Model
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 2
    • 70350342511 scopus 로고    scopus 로고
    • Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 3
    • 80051980769 scopus 로고    scopus 로고
    • Semantic security under related-key attacks and applications
    • Applebaum, B., Ishai, Y., Kushilevitz, E.: Semantic security under related-key attacks and applications. In: ICS, pp. 45-55 (2011)
    • (2011) ICS , pp. 45-55
    • Applebaum, B.1    Ishai, Y.2    Kushilevitz, E.3
  • 4
    • 77957013831 scopus 로고    scopus 로고
    • Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Bellare, M., Cash, D.: Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 666-684. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 666-684
    • Bellare, M.1    Cash, D.2
  • 5
    • 35248860702 scopus 로고    scopus 로고
    • A Theoretical Treatment of Related-key Attacks: RKA-PRPs, RKA-PRFs, and Applications
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Bellare, M., Kohno, T.: A Theoretical Treatment of Related-key Attacks: RKA-PRPs, RKA-PRFs, and Applications. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 491-506. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 6
    • 38049024484 scopus 로고    scopus 로고
    • Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Bellare, M., Shoup, S.: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 201-216. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 201-216
    • Bellare, M.1    Shoup, S.2
  • 7
    • 82955189820 scopus 로고    scopus 로고
    • Cryptography Secure against Related-Key Attacks and Tampering
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg Also Cryptology ePrint Archive, Report 2011/252
    • Bellare, M., Cash, D., Miller, R.: Cryptography Secure against Related-Key Attacks and Tampering. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 486-503. Springer, Heidelberg (2011); Also Cryptology ePrint Archive, Report 2011/252
    • (2011) LNCS , vol.7073 , pp. 486-503
    • Bellare, M.1    Cash, D.2    Miller, R.3
  • 8
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Advances in Cryptology - CRYPTO '97
    • Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997) (Pubitemid 127112576)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 9
    • 35048841300 scopus 로고    scopus 로고
    • Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 10
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Advances in Cryptology - Eurocrypt '97
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997) (Pubitemid 127067792)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 11
    • 33745767987 scopus 로고    scopus 로고
    • Direct chosen ciphertext security from identity-based techniques
    • Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: ACM CCS, pp. 320-329 (2005)
    • (2005) ACM CCS , pp. 320-329
    • Boyen, X.1    Mei, Q.2    Waters, B.3
  • 12
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 13
    • 68549123481 scopus 로고    scopus 로고
    • The Twin Diffie-Hellman problem and applications
    • Cash, D., Kiltz, E., Shoup, V.: The Twin Diffie-Hellman problem and applications. J. Cryptology 22(4), 470-504 (2009)
    • (2009) J. Cryptology , vol.22 , Issue.4 , pp. 470-504
    • Cash, D.1    Kiltz, E.2    Shoup, V.3
  • 14
    • 82955189794 scopus 로고    scopus 로고
    • BiTR: Built-in Tamper Resilience
    • Lee, D.H.,Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • Choi, S.G., Kiayias, A., Malkin, T.: BiTR: Built-in Tamper Resilience. In: Lee, D.H.,Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 740-758. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 740-758
    • Choi, S.G.1    Kiayias, A.2    Malkin, T.3
  • 15
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • Advances in Cryptology - CRYPTO '98
    • Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998) (Pubitemid 128118994)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 16
    • 84947267092 scopus 로고    scopus 로고
    • Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg Also, Cryptology ePrint Archive, Report 2001/085
    • Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002); Also, Cryptology ePrint Archive, Report 2001/085
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 17
    • 85016672373 scopus 로고
    • Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Cramer, R., Damgård, I.B., Schoenmakers, B.: Proof of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 174-187
    • Cramer, R.1    Damgård, I.B.2    Schoenmakers, B.3
  • 19
    • 0343337504 scopus 로고    scopus 로고
    • Nonmalleable cryptography
    • Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM J. Comput. 30(2), 391-437 (2000)
    • (2000) SIAM J. Comput. , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 21
    • 35048896529 scopus 로고    scopus 로고
    • Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 258-277
    • Gennaro, R.1    Lysyanskaya, A.2    Malkin, T.3    Micali, S.4    Rabin, T.5
  • 22
    • 77949606863 scopus 로고    scopus 로고
    • On Related-Secret Pseudorandomness
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Goldenberg, D., Liskov, M.: On Related-Secret Pseudorandomness. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 255-272. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 255-272
    • Goldenberg, D.1    Liskov, M.2
  • 23
    • 79953218346 scopus 로고    scopus 로고
    • Correlated-Input Secure Hash Functions
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Goyal, V., O'Neill, A., Rao, V.: Correlated-Input Secure Hash Functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 182-200. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 182-200
    • Goyal, V.1    O'Neill, A.2    Rao, V.3
  • 24
    • 77649262306 scopus 로고    scopus 로고
    • Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
    • Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
    • Groth, J.: Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444-459. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 444-459
    • Groth, J.1
  • 26
    • 67650677267 scopus 로고    scopus 로고
    • Practical Chosen Ciphertext Secure Encryption from Factoring
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Practical Chosen Ciphertext Secure Encryption from Factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 313-332
    • Hofheinz, D.1    Kiltz, E.2
  • 27
    • 70350302871 scopus 로고    scopus 로고
    • The Group of Signed Quadratic Residues and Applications
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: The Group of Signed Quadratic Residues and Applications. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 637-653. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 637-653
    • Hofheinz, D.1    Kiltz, E.2
  • 28
    • 80051968904 scopus 로고    scopus 로고
    • Cryptography with Tamperable and Leaky Memory
    • Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
    • Kalai, Y.T., Kanukurthi, B., Sahai, A.: Cryptography with Tamperable and Leaky Memory. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 373-390. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6841 , pp. 373-390
    • Kalai, Y.T.1    Kanukurthi, B.2    Sahai, A.3
  • 29
    • 82955184591 scopus 로고    scopus 로고
    • Constant-Round Private Function Evaluation with Linear Complexity
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg Also Cryptology ePrint Archive, Report 2010/528
    • Katz, J., Malka, L.: Constant-Round Private Function Evaluation with Linear Complexity. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 556-571. Springer, Heidelberg (2011); Also Cryptology ePrint Archive, Report 2010/528
    • (2011) LNCS , vol.7073 , pp. 556-571
    • Katz, J.1    Malka, L.2
  • 30
    • 33745574075 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Tag-Based Encryption
    • Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
    • Kiltz, E.: Chosen-Ciphertext Security from Tag-Based Encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581-600. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 581-600
    • Kiltz, E.1
  • 31
    • 77954646659 scopus 로고    scopus 로고
    • Adaptive Trapdoor Functions and Chosen- Ciphertext Security
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Kiltz, E., Mohassel, P., O'Neill, A.: Adaptive Trapdoor Functions and Chosen- Ciphertext Security. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 673-692. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 673-692
    • Kiltz, E.1    Mohassel, P.2    O'Neill, A.3
  • 32
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 33
    • 35048857407 scopus 로고    scopus 로고
    • Ciphers Secure against Related-Key Attacks
    • Roy, B., Meier, W. (eds.) FSE 2004. Springer, Heidelberg
    • Lucks, S.: Ciphers Secure against Related-Key Attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 359-370. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3017 , pp. 359-370
    • Lucks, S.1
  • 34
    • 30744458170 scopus 로고    scopus 로고
    • Alternatives to Non-malleability: Definitions, Constructions, and Applications
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • MacKenzie, P.D., Reiter, M.K., Yang, K.: Alternatives to Non-malleability: Definitions, Constructions, and Applications. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 171-190. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 171-190
    • MacKenzie, P.D.1    Reiter, M.K.2    Yang, K.3
  • 35
    • 84859976564 scopus 로고    scopus 로고
    • Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg Also, Cryptology ePrint Archive, Report 2011/501
    • Micciancio, D., Peikert, C.: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700-718. Springer, Heidelberg (2012); Also, Cryptology ePrint Archive, Report 2011/501
    • (2012) LNCS , vol.7237 , pp. 700-718
    • Micciancio, D.1    Peikert, C.2
  • 36
    • 79952588525 scopus 로고    scopus 로고
    • One-Time Signatures and Chameleon Hash Functions
    • Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. Springer, Heidelberg
    • Mohassel, P.: One-Time Signatures and Chameleon Hash Functions. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 302-319. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6544 , pp. 302-319
    • Mohassel, P.1
  • 37
    • 51849154718 scopus 로고    scopus 로고
    • Adaptive One-Way Functions and Applications
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Pandey, O., Pass, R., Vaikuntanathan, V.: Adaptive One-Way Functions and Applications. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 57-74. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 57-74
    • Pandey, O.1    Pass, R.2    Vaikuntanathan, V.3
  • 38
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • Peikert, C.,Waters, B.: Lossy trapdoor functions and their applications. In: STOC, pp. 187-196 (2008)
    • (2008) STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 39
    • 84974554584 scopus 로고
    • Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2
  • 41
    • 84880883264 scopus 로고    scopus 로고
    • Improved Online/Offline Signature Schemes
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Shamir, A., Tauman, Y.: Improved Online/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355-367. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 42
    • 77957000385 scopus 로고    scopus 로고
    • Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Wee, H.: Efficient Chosen-Ciphertext Security via Extractable Hash Proofs. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 314-332. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 314-332
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.