메뉴 건너뛰기




Volumn 9020, Issue , 2015, Pages 332-352

Public-key encryption indistinguishable under plaintext-checkable attacks

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS; MOBILE SECURITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84925242256     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-46447-2_15     Document Type: Conference Paper
Times cited : (40)

References (31)
  • 2
    • 70350302872 scopus 로고    scopus 로고
    • Smooth projective hashing for conditionally extractable commitments
    • In: Halevi, S. (ed.), LNCS,, Springer, Heidelberg
    • Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671–689. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009 , vol.5677 , pp. 671-689
    • Abdalla, M.1    Chevalier, C.2    Pointcheval, D.3
  • 3
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • In: Vaudenay, S. (ed.), LNCS, Springer, Heidelberg
    • Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005)
    • (2005) PKC 2005 , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 4
    • 77649257689 scopus 로고    scopus 로고
    • A scalable password-based group key exchange protocol in the standard model
    • In: Lai, X., Chen, K. (eds.), LNCS, Springer, Heidelberg
    • Abdalla, M., Pointcheval, D.: A scalable password-based group key exchange protocol in the standard model. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 332–347. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006 , vol.4284 , pp. 332-347
    • Abdalla, M.1    Pointcheval, D.2
  • 5
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes
    • In: Krawczyk, H. (ed.), LNCS, Springer, Heidelberg
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998)
    • (1998) CRYPTO 1998 , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 6
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • In: Preneel, B. (ed.), LNCS, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 139. Springer, Heidelberg (2000)
    • (2000) EUROCRYPT 2000 , vol.1807 , pp. 139
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 8
    • 84884471298 scopus 로고    scopus 로고
    • New techniques for SPHFs and efficient one-round PAKE protocols
    • In: Canetti, R., Garay, J.A. (eds.), LNCS, Springer, Heidelberg
    • Benhamouda, F., Blazy, O., Chevalier, C., Pointcheval, D., Vergnaud, D.: New techniques for SPHFs and efficient one-round PAKE protocols. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 449–475. Springer, Heidelberg (2013)
    • (2013) CRYPTO 2013, Part I , vol.8042 , pp. 449-475
    • Benhamouda, F.1    Blazy, O.2    Chevalier, C.3    Pointcheval, D.4    Vergnaud, D.5
  • 9
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • In: Krawczyk, H. (ed.), LNCS, Springer, Heidelberg
    • Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998)
    • (1998) CRYPTO 1998 , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 10
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • In: Cramer, R. (ed.), LNCS, Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally composable password-based key exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404–421. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005. , vol.3494 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    Mackenzie, P.5
  • 11
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • In: Krawczyk, H. (ed.), LNCS, Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13–25. Springer, Heidelberg (1998)
    • (1998) CRYPTO 1998. , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 12
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • In: Knudsen, L.R. (ed.), LNCS, Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45–64. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 13
    • 85028450627 scopus 로고
    • Non-malleable cryptography (Extended abstract)
    • ACM Press, May
    • Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: 23rd ACM STOC, pp. 542–552. ACM Press, May 1991
    • (1991) 23Rd ACM STOC , pp. 542-552
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 15
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • In: Blakely, G.R., Chaum, D. (eds.), LNCS, Springer, Heidelberg
    • El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
    • (1985) CRYPTO 1984 , vol.196 , pp. 10-18
    • El Gamal, T.1
  • 16
    • 40249098609 scopus 로고    scopus 로고
    • Faster and shorter password-authenticated key exchange
    • In: Canetti, R. (ed.), LNCS, Springer, Heidelberg
    • Gennaro, R.: Faster and shorter password-authenticated key exchange. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 589–606. Springer, Heidelberg (2008)
    • (2008) TCC 2008 , vol.4948 , pp. 589-606
    • Gennaro, R.1
  • 17
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • In: Biham, E. (ed.), LNCS, Springer, Heidelberg
    • Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524–543. Springer, Heidelberg (2003). http://eprint.iacr.org/2003/032.ps.gz
    • (2003) EUROCRYPT 2003 , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 19
    • 78650032056 scopus 로고    scopus 로고
    • A new framework for efficient password-based authenticated key exchange
    • In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.), ACM Press, October
    • Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, pp. 516–525. ACM Press, October 2010
    • (2010) ACM CCS 2010 , pp. 516-525
    • Groce, A.1    Katz, J.2
  • 20
    • 44449140946 scopus 로고    scopus 로고
    • Efficient non-interactive proof systems for bilinear groups
    • Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008)
    • (2008) EUROCRYPT 2008 , vol.4965 , pp. 415-432
    • Groth, J.1    Sahai, A.2
  • 21
    • 24144432254 scopus 로고    scopus 로고
    • Password based key exchange with mutual authentication
    • In: Handschuh, H., Hasan, M.A. (eds.), LNCS, Springer, Heidelberg
    • Jiang, S., Gong, G.: Password based key exchange with mutual authentication. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 267–279. Springer, Heidelberg (2004)
    • (2004) SAC 2004 , vol.3357 , pp. 267-279
    • Jiang, S.1    Gong, G.2
  • 22
    • 26444562427 scopus 로고    scopus 로고
    • Two-server password-only authenticated key exchange
    • In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), LNCS, Springer, Heidelberg
    • Katz, J., MacKenzie, P.D., Taban, G., Gligor, V.D.: Two-server password-only authenticated key exchange. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 1–16. Springer, Heidelberg (2005)
    • (2005) ACNS 2005 , vol.3531 , pp. 1-16
    • Katz, J.1    Mackenzie, P.D.2    Taban, G.3    Gligor, V.D.4
  • 23
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • In: Pfitzmann, B. (ed.), LNCS, Springer, Heidelberg
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475–494. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001. , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 24
    • 35248831117 scopus 로고    scopus 로고
    • Forward secrecy in password-only key exchange protocols
    • In: Cimato, S., Galdi, C., Persiano, G. (eds.), LNCS, Springer, Heidelberg
    • Katz, J., Ostrovsky, R., Yung, M.: Forward secrecy in password-only key exchange protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 29–44. Springer, Heidelberg (2003)
    • (2003) SCN 2002 , vol.2576 , pp. 29-44
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 25
    • 71449093776 scopus 로고    scopus 로고
    • Efficient and secure authenticated key exchange using weak passwords
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM 57(1), 78–116 (2009)
    • (2009) Journal of the ACM , vol.57 , Issue.1 , pp. 78-116
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 26
    • 79953207657 scopus 로고    scopus 로고
    • Round-optimal password-based authenticated key exchange
    • In: Ishai, Y. (ed.), LNCS, Springer, Heidelberg
    • Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293–310. Springer, Heidelberg (2011)
    • (2011) TCC 2011 , vol.6597 , pp. 293-310
    • Katz, J.1    Vaikuntanathan, V.2
  • 27
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • IEEE Computer Society Press, October
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th FOCS, pp. 458–467. IEEE Computer Society Press, October 1997
    • (1997) 38Th FOCS , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 28
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM Press, May
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd ACM STOC, pp. 427–437. ACM Press, May 1990
    • (1990) 22Nd ACM STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 29
    • 84937543435 scopus 로고    scopus 로고
    • REACT: Rapid enhanced-security asymmetric cryptosystem transform
    • In: Naccache, D. (ed.), LNCS, Springer, Heidelberg
    • Okamoto, T., Pointcheval, D.: REACT: rapid enhanced-security asymmetric cryptosystem transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 159–175. Springer, Heidelberg (2001)
    • (2001) CT-RSA 2001 , vol.2020 , pp. 159-175
    • Okamoto, T.1    Pointcheval, D.2
  • 30
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • In: Feigenbaum, J. (ed.), LNCS, Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)
    • (1992) CRYPTO 1991 , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.