Skip to main content
placeholder image

Practical approaches to attaining security against adaptively chosen ciphertext attacks

Chapter


Abstract


  • This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object ciphertext to becryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions and the third on the use of digital signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Two other issues, namely applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed.

Publication Date


  • 1993

Citation


  • Zheng, Y., & Seberry, J. (1993). Practical approaches to attaining security against adaptively chosen ciphertext attacks. In Unknown Book (Vol. 740 LNCS, pp. 292-304). doi:10.1007/3-540-48071-4_20

International Standard Book Number (isbn) 13


  • 9783540573401

Scopus Eid


  • 2-s2.0-85028933312

Web Of Science Accession Number


Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 292

End Page


  • 304

Abstract


  • This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object ciphertext to becryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions and the third on the use of digital signature schemes. Each method is illustrated by an example of a public key cryptosystem based on the intractability of computing discrete logarithms in finite fields. Two other issues, namely applications of the methods to public key cryptosystems based on other intractable problems and enhancement of information authentication capability to the cryptosystems, are also discussed.

Publication Date


  • 1993

Citation


  • Zheng, Y., & Seberry, J. (1993). Practical approaches to attaining security against adaptively chosen ciphertext attacks. In Unknown Book (Vol. 740 LNCS, pp. 292-304). doi:10.1007/3-540-48071-4_20

International Standard Book Number (isbn) 13


  • 9783540573401

Scopus Eid


  • 2-s2.0-85028933312

Web Of Science Accession Number


Book Title


  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Start Page


  • 292

End Page


  • 304