Abstract
Devising public key cryptosystems that are secure against chosen ciphertext attacks has been the subject of investigation by many researchers. However, there are actually very few secure and efficient systems in the literature.
In this paper, we introduce a secure and efficient public key cryptosystem. The main advantage of our schemes is that we employ a problem equivalent to the well-studied RSA problem, and thus our schemes do not rely on conjectures or unproven claims. Therefore, the resulting schemes are as secure as the RSA system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellare, M., Rogaway, P.: Optimal Asymmetric Encryption –How to Encrypt with RSA. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92–111. Springer, Heidelberg (1995)
Bleichenbacher, D.: Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998)
Canetti, R., Goldreich, O., Halevi, S.: The Random Oracle Model, Revisited. In: 30th Symposium on the Theory of Computing (STOC) (1998)
Coron, J., Naccache, D., Desmedt, Y., Odlyzko, A., Stern, J.P.: Index Calculation Attacks on RSA Signature and Encryption. Designe, Codes and Cryptography 38, 41–53 (2006)
Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13–25. Springer, Heidelberg (1998)
Damgård, I.: Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 445–456. Springer, Heidelberg (1992)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. on Inform. Theory IT-22, 644–654 (1976)
Dolev, D., Dwork, C., Naor, M.: Non-Malleable Cryptography. In: 23rd Annual Symposium on the Theory of Computing (STOC), pp. 542–552 (1991)
ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. on Inform. Theory 31, 469–472 (1985)
Frankel, Y., Yung, M.: Cryptanalysis of the Immunized LL Public Key Systems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 287–296. Springer, Heidelberg (1995)
Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences 28, 270–299 (1984)
Lim, C., Lee, P.: Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 420–434. Springer, Heidelberg (1994)
Naor, M., Yung, M.: Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: 22nd Annual ACM Symp. on Theory of Computing, pp. 427–437 (1990)
Okamoto, T., Pointcheval, D.: RSA-REACT: An Alternative to RSA-OAEP. In: Proceedings of Second NESSIE Workshop, Egham, UK (2001)
Pointcheval, D.: New Public Key Cryptosystems Based on the Dependent-RSA Problem. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 239–254. Springer, Heidelberg (1999)
Rackoff, C., Simon, D.: Noninteractive Zero-knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21, 120–126 (1978)
Shoup, V., Gennaro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1–16. Springer, Heidelberg (1998)
Tsiounis, Y., Yung, M.: On the Security of ElGamal based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998)
Zheng, Y., Seberry, J.: Practical Approaches to Attaining Security against Adaptive Chosen Ciphertext Attacks. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 292–304. Springer, Heidelberg (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghodosi, H. (2006). An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_21
Download citation
DOI: https://doi.org/10.1007/11961635_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68962-1
Online ISBN: 978-3-540-68963-8
eBook Packages: Computer ScienceComputer Science (R0)