DocumentCode
923670
Title
Immunizing public key cryptosystems against chosen ciphertext attacks
Author
Zheng, Yuliang ; Seberry, Jennifer
Author_Institution
Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
Volume
11
Issue
5
fYear
1993
fDate
6/1/1993 12:00:00 AM
Firstpage
715
Lastpage
724
Abstract
Three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks are presented. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertext except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions, and the third on the use of digital signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Security of the three example cryptosystems is formally proved. Two other issues, namely, applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed
Keywords
message authentication; public key cryptography; ciphertext attacks; deciphering algorithm; digital signature; discrete logarithms; immunization methods; information authentication; one-way hash functions; public key cryptosystems; strengthening method; universal hash functions; Australia Council; Authentication; Computer science; Computer security; Digital signatures; Electronic mail; Galois fields; Information technology; Modems; Public key cryptography;
fLanguage
English
Journal_Title
Selected Areas in Communications, IEEE Journal on
Publisher
ieee
ISSN
0733-8716
Type
jour
DOI
10.1109/49.223871
Filename
223871
Link To Document