DocumentCode :
923670
Title :
Immunizing public key cryptosystems against chosen ciphertext attacks
Author :
Zheng, Yuliang ; Seberry, Jennifer
Author_Institution :
Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
Volume :
11
Issue :
5
fYear :
1993
fDate :
6/1/1993 12:00:00 AM
Firstpage :
715
Lastpage :
724
Abstract :
Three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks are presented. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertext except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions, and the third on the use of digital signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Security of the three example cryptosystems is formally proved. Two other issues, namely, applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed
Keywords :
message authentication; public key cryptography; ciphertext attacks; deciphering algorithm; digital signature; discrete logarithms; immunization methods; information authentication; one-way hash functions; public key cryptosystems; strengthening method; universal hash functions; Australia Council; Authentication; Computer science; Computer security; Digital signatures; Electronic mail; Galois fields; Information technology; Modems; Public key cryptography;
fLanguage :
English
Journal_Title :
Selected Areas in Communications, IEEE Journal on
Publisher :
ieee
ISSN :
0733-8716
Type :
jour
DOI :
10.1109/49.223871
Filename :
223871
Link To Document :
بازگشت