• DocumentCode
    923670
  • Title

    Immunizing public key cryptosystems against chosen ciphertext attacks

  • Author

    Zheng, Yuliang ; Seberry, Jennifer

  • Author_Institution
    Dept. of Comput. Sci., Wollongong Univ., NSW, Australia
  • Volume
    11
  • Issue
    5
  • fYear
    1993
  • fDate
    6/1/1993 12:00:00 AM
  • Firstpage
    715
  • Lastpage
    724
  • Abstract
    Three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks are presented. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertext except for the exact object ciphertext to be cryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions, and the third on the use of digital signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Security of the three example cryptosystems is formally proved. Two other issues, namely, applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed
  • Keywords
    message authentication; public key cryptography; ciphertext attacks; deciphering algorithm; digital signature; discrete logarithms; immunization methods; information authentication; one-way hash functions; public key cryptosystems; strengthening method; universal hash functions; Australia Council; Authentication; Computer science; Computer security; Digital signatures; Electronic mail; Galois fields; Information technology; Modems; Public key cryptography;
  • fLanguage
    English
  • Journal_Title
    Selected Areas in Communications, IEEE Journal on
  • Publisher
    ieee
  • ISSN
    0733-8716
  • Type

    jour

  • DOI
    10.1109/49.223871
  • Filename
    223871