메뉴 건너뛰기




Volumn 2274, Issue , 2002, Pages 1-16

New semantically secure public-key cryptosystems from the rsa-primitive

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SEMANTICS; STEREO VISION;

EID: 84958964396     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45664-3_1     Document Type: Conference Paper
Times cited : (15)

References (17)
  • 1
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notions of security for public-key encryption schemes,”
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes,” CRYPTO’98, LNCS 1462, (1998), pp.26-45.
    • (1998) CRYPTO’98, LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 2
    • 84945139265 scopus 로고    scopus 로고
    • The bit security of Pailliers encryption scheme and its applications,”
    • D. Catalano, R. Gennaro, and N. Howgraw-Graham; “The bit security of Paillier’s encryption scheme and its applications,” Eurocrypt 2001, LNCS 2045, pp.229-243, 2001.
    • (2001) Eurocrypt 2001, LNCS , vol.2045 , pp. 229-243
    • Catalano, D.1    Gennaro, R.2    Howgraw-Graham, N.3
  • 4
    • 84947924912 scopus 로고    scopus 로고
    • Finding a small root of a univariate modular equation
    • D. Coppersmith, “Finding a small root of a univariate modular equation,” EUROCRYPT’96, LNCS 1070, pp.155–165, 1996.
    • (1996) EUROCRYPT’96, LNCS , vol.1070 , pp. 155-165
    • Coppersmith, D.1
  • 6
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup, “A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack,” CRYPTO’98, LNCS 1462, pp.13-25, 1998.
    • (1998) CRYPTO’98, LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 7
    • 35248883505 scopus 로고    scopus 로고
    • “Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-Key encryption
    • R. Cramer and V. Shoup, “Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-Key encryption,” Cryptology ePrint Archive, IACR, http://eprint.iacr.org/, 2001.
    • (2001) Cryptology Eprint Archive, IACR
    • Cramer, R.1    Shoup, V.2
  • 8
    • 84867553981 scopus 로고    scopus 로고
    • A generalization, a simplification and some applications of Pailliers probabilistic public-Key system,”
    • I. Damgård and M. Jurik; “A generalization, a simplification and some applications of Paillier’s probabilistic public-Key system,” PKC 2001, LNCS 1992, pp.119-136, 2001.
    • (2001) PKC 2001, LNCS , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 9
    • 0011189534 scopus 로고    scopus 로고
    • Stronger security proofs for RSA and Rabin bits
    • R. Fischlin and C.P. Schnorr; “Stronger security proofs for RSA and Rabin bits,” Journal of Cryptology, 13 (2), pp.221-244, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.2 , pp. 221-244
    • Fischlin, R.1    Schnorr, C.P.2
  • 11
    • 0346386524 scopus 로고
    • Efficient, perfect random number generators
    • S. Micali and C. Schnorr, “Efficient, perfect random number generators,” Crypto’88, LNCS 403, pp.173-199, 1988.
    • (1988) Crypto’88, LNCS , vol.403 , pp. 173-199
    • Micali, S.1    Schnorr, C.2
  • 12
    • 0025207738 scopus 로고
    • A fast signature scheme based on congruential polynomial operations,”
    • T. Okamoto; “A fast signature scheme based on congruential polynomial operations,” IEEE Transactions on Information Theory, IT-36, pp.47-53, 1990.
    • (1990) IEEE Transactions on Information Theory, IT-36 , pp. 47-53
    • Okamoto, T.1
  • 13
    • 84937389342 scopus 로고    scopus 로고
    • The Gap-Problems: A new class of problems for the security of cryptographic schemes
    • T. Okamoto and D. Pointcheval, “The Gap-Problems: a new class of problems for the security of cryptographic schemes,” PKC 2001, LNCS 1992, pp.104-118, 2001.
    • (2001) PKC 2001, LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 14
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • T. Okamoto and S. Uchiyama; “A new public-key cryptosystem as secure as factoring,” Eurocrypt’98, LNCS 1403, pp.308-318, 1998.
    • (1998) Eurocrypt’98, LNCS , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 15
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier; “Public-key cryptosystems based on composite degree residuosity classes,” Eurocrypt’99, LNCS 1592, pp.223-238, 1999.
    • (1999) Eurocrypt’99, LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 16
    • 84957652328 scopus 로고    scopus 로고
    • New public key cryptosystems based on the dependent-RSA problems
    • D. Pointcheval, “New public key cryptosystems based on the dependent-RSA problems,” Eurocryt’99, LNCS 1592, pp. 239-254, 1999.
    • (1999) Eurocryt’99, LNCS , vol.1592 , pp. 239-254
    • Pointcheval, D.1
  • 17
    • 84958680532 scopus 로고    scopus 로고
    • Fast RSA-type cryptosystems using n-adic expansion
    • T. Takagi, “Fast RSA-type cryptosystems using n-adic expansion,” CRYPTO’97, LNCS 1294, pp.372-384, 1997.
    • (1997) CRYPTO’97, LNCS , vol.1294 , pp. 372-384
    • Takagi, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.