Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
Top Cited Papers
- 1 January 2003
- journal article
- Published by Society for Industrial & Applied Mathematics (SIAM) in SIAM Journal on Computing
- Vol. 33 (1), 167-226
- https://doi.org/10.1137/s0097539702403773
Abstract
A new public-key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first public-key encryption schemes in the literature that are simultaneously practical and provably secure.Keywords
This publication has 11 references indexed in Scilit:
- Securing Threshold Cryptosystems against Chosen Ciphertext AttackJournal of Cryptology, 2002
- Signature schemes based on the strong RSA assumptionACM Transactions on Information and System Security, 2000
- Optimistic fair exchange of digital signaturesIEEE Journal on Selected Areas in Communications, 2000
- Nonmalleable CryptographySIAM Journal on Computing, 2000
- The Diffie–Hellman ProtocolDesigns, Codes and Cryptography, 2000
- A Pseudorandom Generator from any One-way FunctionSIAM Journal on Computing, 1999
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- A heuristic asymptotic formula concerning the distribution of prime numbersMathematics of Computation, 1962