Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)

@inproceedings{Zheng1992PracticalAT,
  title={Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)},
  author={Yuliang Zheng and Jennifer Seberry},
  booktitle={CRYPTO},
  year={1992}
}
This paper presents three mcthods for strengthening public key cryptosystems in such a way t,hat they become secure against adaptiuely chosen ciphertext attacks. In an adaptively chosen ciphertext a t tack, an attacker can query the deciphering algorithm with any ciphertexts, ezcept for t h e exact object ciphertext to becryptanalyzed. The first strengthening method is based on the use of one-way hash functions, the second on the use of universal hash functions and the third on the use of… CONTINUE READING
Highly Cited
This paper has 52 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 33 extracted citations

Fully automated analysis of padding-based encryption in the computational model

ACM Conference on Computer and Communications Security • 2013
View 1 Excerpt

Coded Modulation and the Arrival of Signcryption

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes • 2009
View 1 Excerpt

53 Citations

051015'93'98'04'10'16
Citations per Year
Semantic Scholar estimates that this publication has 53 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Damgird . Towards practical public key systems secure against chosen ciphertext attacks

J. Feigenbaum
Advances in Cryptology - Proceedings of Crypto ‘ , 91 . Lecture Notes in Computer Science • 1992

Son - int , eractive zero - knowledge proof of knowledge and chosen - ciphertext attacks

J. Feigenbaurn
Handbook of Theoretical Computer Science , Volume A , Algorithms a n d Complezity • 1990

Hyperelliptic cryptosystems

Journal of Cryptology • 1989

Similar Papers

Loading similar papers…