Skip to main content
Log in

Zheng and Seberry’s public key encryption scheme revisited

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

In this paper, we prove that a slightly modified version of Zheng and Seberry’s public key encryption scheme presented at Crypto ’92 is secure against adaptive chosen ciphertext attacks in the random oracle model, assuming the Gap Diffie–Hellman problem is intractable. A further contribution of this paper is to show that Soldera, Seberry, and Qu’s recent security analysis of Zheng and Seberry’s scheme is in fact flawed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abdala M, Bellare M, Rogaway P (2001) The oracle Diffie–Hellman assumptions and an analysis of DHIES. In: Naccache D (ed) Progress in cryptology – CT-RSA 2001, San Francisco. Lecture notes in computer science, vol 2020, Springer, Berlin Heidelberg New York, pp 143–158

  2. Bellare M, Desai A, Pointcheval D, Rogaway P (1998) Relations among notions of security for public-key encryption schemes. In: Krawczyk H (ed) Advances in cryptology – Crypto ’98, Santa Barbara. Lecture notes in computer science, vol 1462, Springer, Berlin Heidelberg New York, pp 26–45

  3. Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, Fairfax, VA, November 1993. ACM Press, New York, pp 62–73

  4. FIPS Publication 180-1 (1995) Secure hash standard

  5. IEEE P1363 (2000) Standard specifications for public key cryptography

  6. Lim C, Lee P (1993) Another method for attaining security against adaptively chosen ciphertext attack. In: Stinson D (ed) Advances in cryptology – Crypto ’93, Santa Barbara, CA. Lecture notes in computer science, vol 773, Springer, Berlin Heidelberg New York, pp 410–434

  7. Okamoto T, Pointcheval D (2001) The Gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim K (ed) Public key cryptography – PKC 2001, Cheju Island, South Korea. Lecture notes in computer science, vol 1992, Springer, Berlin Heidelberg New York, pp 104–118

  8. Okamoto T, Pointcheval D (2001) REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Naccache D (ed) Progress in cryptology – CT-RSA 2001, San Francisco. Lecture notes in computer science, vol 2020, Springer, Berlin Heidelberg New York, pp 159–174

  9. Shoup V (2001) OAEP reconsidered. In: Kilian J (ed) Advances in cryptology – Crypto 2001, Santa Barbara, CA. Lecture notes in computer science, vol 2139, Springer, Berlin Heidelberg New York, pp 239–259

  10. Soldera D, Seberry J, Qu C (2002) The analysis of Zheng–Seberry scheme. In: Batten L, Seberry J (eds) Proceedings of the Australasian conference on information security and privacy – ACISP 2002, Melbourne, Australia, July 2002. Lecture notes in computer science, vol 2384, Springer, Berlin Heidelberg New York, pp 159–168

  11. Zheng Y (1994) Improved public key cryptosystems secure against chosen ciphertext attacks. Technical Note, The Centre for Computer Security Research, University of Wollongong, Sydney, Australia

  12. Zheng Y, Seberry J (1992) Practical approaches to attaining security against adaptively chosen ciphertext attacks. In: Brickell E (ed) Advances in cryptology – Crypto ’92, Santa Barbara, CA. Lecture notes in computer science, vol 742, Springer, Berlin Heidelberg New York, pp 292–304

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Joonsang Baek or Yuliang Zheng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Baek, J., Zheng, Y. Zheng and Seberry’s public key encryption scheme revisited. IJIS 2, 37–44 (2003). https://doi.org/10.1007/s10207-003-0023-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-003-0023-7

Keywords

Navigation