메뉴 건너뛰기




Volumn 1592, Issue , 1999, Pages 239-254

New public key cryptosystems based on the dependent-RSA problems

Author keywords

Chosen cipher text attacks; Public key encryption; Semantic security; The dependent RSA problem

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; PUBLIC KEY CRYPTOGRAPHY; SEMANTICS;

EID: 84957652328     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48910-X_17     Document Type: Conference Paper
Times cited : (41)

References (23)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations Among Notions of Security for Public-Key Encryption Schemes
    • Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In Crypto '98, LNCS 1462, pages 26-45. Springer-Verlag, 1998.
    • (1998) Crypto '98 , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 2
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for De- signing Efficient Protocols
    • ACM press
    • M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for De- signing Efficient Protocols. In Proc. of the 1st CCCS, pages 62-73. ACM press, 1993.
    • (1993) Proc. of the 1St CCCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84948986458 scopus 로고
    • Optimal Asymmetric Encryption -How to Encrypt with RSA
    • Springer-Verlag
    • M. Bellare and P. Rogaway. Optimal Asymmetric Encryption -How to Encrypt with RSA. In Eurocrypt '94, LNCS 950, pages 92-111. Springer-Verlag, 1995.
    • (1995) Eurocrypt '94 , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84957693225 scopus 로고    scopus 로고
    • A Chosen Ciphertext Attack against Protocols based on the RSA Encryption Standard PKCS #1
    • Springer-Verlag
    • D. Bleichenbacher. A Chosen Ciphertext Attack against Protocols based on the RSA Encryption Standard PKCS #1. In Crypto '98, LNCS 1462, pages 1-12. Springer-Verlag, 1998.
    • (1998) Crypto '98 , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 5
    • 84957610823 scopus 로고    scopus 로고
    • Speedings up Discrete Log and Factor- ing Based Schemes via Precomputations
    • Springer- Verlag
    • V. Boyko, M. Peinado, and R. Venkatesan. Speedings up Discrete Log and Factor- ing Based Schemes via Precomputations. In Eurocrypt '98, LNCS 1403. Springer- Verlag, 1998.
    • (1998) Eurocrypt '98 , vol.1403
    • Boyko, V.1    Peinado, M.2    Venkatesan, R.3
  • 7
    • 84947902524 scopus 로고    scopus 로고
    • Low-Exponent RSA with Related Messages
    • Springer-Verlag
    • D. Coppersmith, M. Franklin, J. Patarin, and M. Reiter. Low-Exponent RSA with Related Messages. In Eurocrypt '96, LNCS 1070, pages 1-9. Springer-Verlag, 1996.
    • (1996) Eurocrypt '96 , vol.1070 , pp. 1-9
    • Coppersmith, D.1    Franklin, M.2    Patarin, J.3    Reiter, M.4
  • 8
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
    • Springer-Verlag
    • R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In Crypto '98, LNCS 1462, pages 13-25. Springer-Verlag, 1998.
    • (1998) Crypto '98 , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 9
  • 11
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • July
    • T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In IEEE Transactions on Information Theory, volume IT-31, no. 4, pages 469-472, July 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 13
    • 0023985175 scopus 로고
    • Solving Simultaneous Modular Equations of Low Degree
    • J. Håstad. Solving Simultaneous Modular Equations of Low Degree. SIAM Journal of Computing, 17:336-341, 1988.
    • (1988) SIAM Journal of Computing , vol.17 , pp. 336-341
    • Håstad, J.1
  • 14
    • 84957714507 scopus 로고    scopus 로고
    • Formal Protocol Deffinition, may, Available from
    • SET Secure Electronic Transaction LLC. SET Secure Electronic Transaction Speciffication -Book 3: Formal Protocol Deffinition, may 1997. Available from http://www.setco.org/.
    • (1997) SET Secure Electronic Transaction Speciffication -Book , vol.3
  • 15
    • 0032218237 scopus 로고    scopus 로고
    • A New Cryptosystem based on Higher Residues
    • ACM press
    • D. Naccache and J. Stern. A New Cryptosystem based on Higher Residues. In Proc. of the 5th CCCS, pages 59-66. ACM press, 1998.
    • (1998) Proc. of the 5Th CCCS , pp. 59-66
    • Naccache, D.1    Stern, J.2
  • 16
    • 0024983231 scopus 로고
    • Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
    • ACM Press
    • M. Naor and M. Yung. Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In Proc. of the 22nd STOC, pages 427-437. ACM Press, 1990.
    • (1990) Proc. of the 22Nd STOC , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 17
    • 84956852274 scopus 로고    scopus 로고
    • A New Public Key Cryptosystem as Secure as Factoring
    • Springer-Verlag
    • T. Okamoto and S. Uchiyama. A New Public Key Cryptosystem as Secure as Factoring. In Eurocrypt '98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
    • (1998) Eurocrypt '98 , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 18
    • 0000277371 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Discrete Logarithms Residues
    • Springer-Verlag
    • P. Paillier. Public-Key Cryptosystems Based on Discrete Logarithms Residues. In Eurocrypt '99, LNCS 1592, pages 221-236. Springer-Verlag, 1999.
    • (1999) Eurocrypt '99 , vol.1592 , pp. 221-236
    • Paillier, P.1
  • 19
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Springer- Verlag
    • C. Racko_ and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Crypto '91, LNCS 576, pages 433-444. Springer- Verlag, 1992.
    • (1992) Crypto '91 , vol.576 , pp. 433-444
    • Racko_, C.1    Simon, D.R.2
  • 20
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 22
    • 0001977576 scopus 로고
    • The Computational Complexity of Continued Fractions
    • V. Strassen. The Computational Complexity of Continued Fractions. SIAM Jour- nal of Computing, 12(1):1-27, 1983.
    • (1983) SIAM Jour- Nal of Computing , vol.12 , Issue.1 , pp. 1-27
    • Strassen, V.1
  • 23
    • 0005044302 scopus 로고    scopus 로고
    • On the Security of El Gamal based Encryption
    • LNCS. Springer-Verlag
    • Y. Tsiounis and M. Yung. On the Security of El Gamal based Encryption. In PKC '98, LNCS. Springer-Verlag, 1998.
    • (1998) PKC '98
    • Tsiounis, Y.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.