New Public Key Cryptosystemsbased on the Dependent {

نویسنده

  • David Pointcheval
چکیده

Since the Diie-Hellman paper, asymmetric encryption has been a very important topic, and furthermore ever well studied. However, between the eeciency of RSA and the security of some less eecient schemes, no trade-oo has ever been provided. In this paper, we propose better than a trade-oo: indeed, we rst present a new problem, derived from the RSA assumption, the \Dependent{RSA Problem". A careful study of its diiculty is performed and some variants are proposed, namely the \Decisional Dependent{RSA Problem". They are next used to provide new encryption schemes which are both secure and eecient. More precisely, the main scheme is proven semantically secure in the standard model. Then, two variants are derived with improved security properties, namely against adaptive chosen-ciphertext attacks, in the random oracle model. Furthermore, all those schemes are more or less as eecient as the original RSA encryption scheme and reach semantic security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improvements of the attacks on cryptosystemsbased on error -

Many public-key cryptosystems and identiication schemes based on error-correcting codes have been proposed as an alternative to the common cryptographic algorithms based on number theory. They rely on the NP-hardness of nding a xed-weight word in a coset of a linear binary code. We here improve the previous attacks on these systems; this notably enables us to reduce the work factor involved in ...

متن کامل

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

Cellular SRC kinases and dsRNA dependent protein kinase (PKR) play key role in intracellular viral (CVB3) replication

SRC kinases and PKR are intracellular protein kinases, which play key roles in intracellular viral replication. In this research, the effect of SRC kinase inhibition and PKR activation and inhibition on replication of coxsakievirus (CVB3), an entrovirus of the family picornaviridae – causative agents of fatal myocarditis, was studied. Vero and Hela cells were cultured and infected with CVB3 in ...

متن کامل

Cellular SRC kinases and dsRNA dependent protein kinase (PKR) play key role in intracellular viral (CVB3) replication

SRC kinases and PKR are intracellular protein kinases, which play key roles in intracellular viral replication. In this research, the effect of SRC kinase inhibition and PKR activation and inhibition on replication of coxsakievirus (CVB3), an entrovirus of the family picornaviridae – causative agents of fatal myocarditis, was studied. Vero and Hela cells were cultured and infected with CVB3 in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999