Results 1  10
of
553,698
Relations among notions of security for publickey encryption schemes
, 1998
"... Abstract. We compare the relative strengths of popular notions of security for public key encryption schemes. We consider the goals of privacy and nonmalleability, each under chosen plaintext attack and two kinds of chosen ciphertext attack. For each of the resulting pairs of definitions we prove e ..."
Abstract

Cited by 517 (69 self)
 Add to MetaCart
Abstract. We compare the relative strengths of popular notions of security for public key encryption schemes. We consider the goals of privacy and nonmalleability, each under chosen plaintext attack and two kinds of chosen ciphertext attack. For each of the resulting pairs of definitions we prove
Cryptanalysis of a PublicKey Encryption Scheme Based
 Jianying Zhou (Eds.): Public Key Cryptography  PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 14, 2004. Lecture Notes in Computer Science 2947
, 2003
"... We describe a cryptanalysis of a publickey encryption scheme based on the polynomial reconstruction problem . Given the publickey and a ciphertext, we recover the corresponding plaintext in polynomial time. Therefore, the scheme is not oneway. ..."
Abstract
 Add to MetaCart
We describe a cryptanalysis of a publickey encryption scheme based on the polynomial reconstruction problem . Given the publickey and a ciphertext, we recover the corresponding plaintext in polynomial time. Therefore, the scheme is not oneway.
A ForwardSecure PublicKey Encryption Scheme
, 2003
"... Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious and realistic concern. In an e#ort to mitigate the damage caused by exposure of secret data (e.g., keys) stored on such devices, the paradigm of forward security was int ..."
Abstract

Cited by 250 (14 self)
 Add to MetaCart
was introduced. In a forwardsecure scheme, secret keys are updated at regular periods of time; furthermore, exposure of a secret key corresponding to a given time period does not enable an adversary to "break" the scheme (in the appropriate sense) for any prior time period.
On PlaintextAware PUBLICKEY ENCRYPTION SCHEMES
, 2010
"... Plaintext awareness is a property of a publickey encryption scheme intended to capture the idea that the only way to produce a valid ciphertext is to take a message and encrypt it. The idea is compelling, but the devil, as always, is in the details. The established definition of plaintext awarenes ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Plaintext awareness is a property of a publickey encryption scheme intended to capture the idea that the only way to produce a valid ciphertext is to take a message and encrypt it. The idea is compelling, but the devil, as always, is in the details. The established definition of plaintext
Design and Analysis of Practical PublicKey Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
 SIAM Journal on Computing
, 2001
"... A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first publickey encryption sc ..."
Abstract

Cited by 231 (11 self)
 Add to MetaCart
A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first publickey encryption
Cryptanalysis of a PublicKey Encryption Scheme Based on the Polynomial Reconstruction Problem
 Jianying Zhou (Eds.): Public Key Cryptography  PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 14, 2004. Lecture Notes in Computer Science 2947
, 2003
"... We describe a cryptanalysis of a publickey encryption scheme based on the polynomial reconstruction problem . Given the publickey and a ciphertext, we recover the corresponding plaintext in polynomial time. Therefore, the scheme is not oneway. ..."
Abstract

Cited by 8 (1 self)
 Add to MetaCart
We describe a cryptanalysis of a publickey encryption scheme based on the polynomial reconstruction problem . Given the publickey and a ciphertext, we recover the corresponding plaintext in polynomial time. Therefore, the scheme is not oneway.
Building KeyPrivate PublicKey Encryption Schemes
"... Abstract. In the setting of identitybased encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts corresponding to the same message and identity, but generated using different TA master publickeys. This security proper ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
property has applications in the prevention of traffic analysis in coalition networking environments. In this paper, we examine the implications of TA anonymity for keyprivacy for normal publickey encryption (PKE) schemes. Keyprivacy for PKE captures the requirement that ciphertexts should not leak any
Publickey encryption schemes with auxiliary inputs
 In TCC. 2010. [Fei02] U. Feige. Relations
"... Abstract. We construct publickey cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key informationtheoretically). Our schemes are based on the decisional DiffieHellma ..."
Abstract

Cited by 22 (7 self)
 Add to MetaCart
Abstract. We construct publickey cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key informationtheoretically). Our schemes are based on the decisional Diffie
A mediumeld multivariate publickey encryption scheme
 In CTRSA 2006, volume 3860 of LNCS
"... Abstract. Electronic commerce fundamentally requires two di erent publickey cryptographical primitives, for key agreement and authentication. We present the new encryption scheme MFE, and provide a performance and security review. MFE belongs to the MQ class, an alternative class of PKCs also terme ..."
Abstract

Cited by 9 (1 self)
 Add to MetaCart
Abstract. Electronic commerce fundamentally requires two di erent publickey cryptographical primitives, for key agreement and authentication. We present the new encryption scheme MFE, and provide a performance and security review. MFE belongs to the MQ class, an alternative class of PKCs also
A ForwardSecure PublicKey Encryption Scheme
, 2002
"... Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious and realistic concern. In an effort to mitigate the damage caused by exposure of secret data stored on such devices, the paradigm of forward security was introduced. In this ..."
Abstract

Cited by 20 (0 self)
 Add to MetaCart
of forwardsecure digital signature schemes and symmetrickey schemes are known. We present the first construction of a forwardsecure publickey whose security is based on the bilinear DiffieHellman assumption in the random oracle model. Our scheme can be extended to achieve chosenciphertext security
Results 1  10
of
553,698