Trapdoor permutation polynomials of Z/nZ and public key cryptosystems (Extended abstract)

被引:0
作者
Castagnos, Guilhem [1 ]
Vergnaud, Damien [2 ]
机构
[1] Univ Limoges, DMI XLIM, 123 Ave Albert Thomas, F-87060 Limoges, France
[2] Ecole Normale Superieure, Dept Informat, Paris 75230, France
来源
INFORMATION SECURITY, PROCEEDINGS | 2007年 / 4779卷
关键词
public key encryption; semantic security; standard model; random oracle model; chosen-ciphertext attacks; polynomial Diffie-Hellman problems; DIGITAL-SIGNATURES; ENCRYPTION; ASSUMPTIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We define new algorithmic problems and discuss their properties (in particular, we present a careful study of their computational complexity). We apply the new problems to design public key encryption protocols with semantic security relative to their decisional variants. We then show how to provide efficient schemes that are semantically secure under adaptive chosen ciphertext attacks in the random oracle model. Finally, we show that the ideas developed in this extended abstract can be used to design the most efficient known cryptosystem with semantic security under non-adaptive chosen ciphertext attacks in the standard security model.
引用
收藏
页码:333 / +
页数:4
相关论文
共 24 条
[11]  
Demytko N., 1993, Lecture Notes in Computer Science, V765, P40
[12]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[13]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299
[14]   Efficient computation of full Lucas sequences [J].
Joye, M ;
Quisquater, JJ .
ELECTRONICS LETTERS, 1996, 32 (06) :537-538
[15]  
KRAWCZYK H, 1998, LNCS, V1462
[16]  
Lidl R., 1993, PITMAN MONOGRAPHS SU, V65
[17]  
Muller W.B., 1981, STUDIA SCI MATH HUNG, V16, P71
[18]  
MULLER WB, 1986, LECT NOTES COMPUT SC, V219, P50
[19]  
Naor M, 2003, LECT NOTES COMPUT SC, V2729, P96
[20]  
Pointcheval D, 1999, LECT NOTES COMPUT SC, V1592, P239