Filters








9,751 Hits in 2.4 sec

SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation [chapter]

Roman Novak
2002 Lecture Notes in Computer Science  
We describe an adaptive chosen-ciphertext attack on a smart card implementation of the RSA decryption algorithm in the presence of side-channel information leakage.  ...  We have shown how an adversary could use very few bits of information in an adaptive chosen-ciphertext attack.  ...  We show that an adversary can use the information about the algorithm's execution path in the adaptive chosen-ciphertext attack.  ... 
doi:10.1007/3-540-45664-3_18 fatcat:hg4xdmuhd5e5rhq3eevlv7kzru

Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems [chapter]

Jens Groth
2004 Lecture Notes in Computer Science  
Recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack (RCCA) secure encryption.  ...  By this, we mean that anybody can convert a ciphertext y with plaintext m into a different ciphertext y that is distributed identically to a fresh encryption of m.  ...  Introduction Security against adaptive chosen ciphertext attacks (CCA2) has become the golden security standard for public-key cryptosystems.  ... 
doi:10.1007/978-3-540-24638-1_9 fatcat:rqwdddbzovb3tf5bmeaewckuxi

On Quantum Chosen-Ciphertext Attacks and Learning with Errors [article]

Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba
2019 arXiv   pre-print
Rather, our results mean that, if these cryptosystems are exposed to chosen-ciphertext attacks (e.g., as a result of deployment in an inappropriate real-world setting) then quantum attacks are even more  ...  ., post-quantum chosen-plaintext secrecy).  ...  [BJ15; GHS16] , and encryption secure against both quantum chosenplaintext and adaptive quantum chosen-ciphertext attacks (QCCA2) [BZ13b] .  ... 
arXiv:1808.09655v2 fatcat:hns3v7hetvayddrnluw2nugm7q

Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece Public-Key Cryptosystem [chapter]

Eric R. Verheul, Jeroen M. Doumen, Henk C. A. Tilborg
2002 Information, Coding and Mathematics  
doi:10.1007/978-1-4757-3585-7_7 fatcat:nmq6wm2eg5b5hnfbqrkllbsx2u

A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks [chapter]

Jan Camenisch, Nishanth Chandran, Victor Shoup
2009 Lecture Notes in Computer Science  
However, they left as an open problem that of designing an encryption scheme that simultaneously provides security against both key dependent chosen plaintext and adaptive chosen ciphertext attack (KDM-CCA2  ...  However, Boneh et al. left as an open problem the construction of an encryption scheme that is simultaneously secure against key dependent chosen plaintext and chosen ciphertext attack (KDM-CCA2).  ...  [5] to the notion of security against chosen ciphertext attack ( [30, 31, 15] ).  ... 
doi:10.1007/978-3-642-01001-9_20 fatcat:mn4ibpbanzcprc6w5z5o3a2inm

Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack [chapter]

Yevgeniy Dodis, Nelly Fazio
2002 Lecture Notes in Computer Science  
security even against chosen plaintext attacks.  ...  We construct the first adaptive chosen ciphertext (CCA2) secure public key Broadcast Encryption Scheme under the DDH assumption (with no random oracles).  ...  z-resilient against chosen ciphertext attacks.  ... 
doi:10.1007/3-540-36288-6_8 fatcat:upje6ra2ufertn37yowfx2u4ma

How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack [chapter]

Yitao Duan, John Canny
2006 Lecture Notes in Computer Science  
Our constructions feature truly constant-size decryption keys whereas the lengths of both the encryption key and ciphertext are independent of group size.  ...  We do not explicitly consider non-adaptive chosen ciphertext attack (CCA1).  ...  Rackoff and Simon later [46] improved this construction to be secure against adaptive chosen ciphertext attack (CCA2).  ... 
doi:10.1007/11605805_16 fatcat:4azki6re6zh7pce23tfcvogv3m

An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack [chapter]

Philip Mac Kenzie
2002 Lecture Notes in Computer Science  
We propose an efficient two-party public key cryptosystem that is secure against adaptive chosen ciphertext attack, based on the hardness of Decision Diffie-Hellman (DDH).  ...  Previous results on efficient threshold cryptosystems secure against adaptive chosen ciphertext attack required either (1) a strict majority of uncorrupted decryption servers, and thus do not apply to  ...  There have been previous proposals for threshold cryptosystems secure against adaptive chosen ciphertext attack, namely, Shoup and Gennaro [42] , Canetti and Goldwasser [10] , Abe [1] , Jarecki and  ... 
doi:10.1007/3-540-36288-6_4 fatcat:bd62denbozg75kmxa6xrknh5yu

A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack [chapter]

Ronald Cramer, Victor Shoup
1998 Lecture Notes in Computer Science  
The scheme is quite practical, and is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions.  ...  adaptive chosen ciphertext attack.  ...  Thus, with just a bit more computation, we get security against adaptive chosen ciphertext attack, whereas the basic El Gamal scheme is completely insecure against adaptive chosen ciphertext attack.  ... 
doi:10.1007/bfb0055717 fatcat:bx3mcfgpvvgrhf57wj2sg3r6ou

An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) [chapter]

Ran Canetti, Shafi Goldwasser
1999 Lecture Notes in Computer Science  
This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack, under the Decisional Diffie-Hellman (DDH) intractability assumption.  ...  Previously, it was shown how to design non-interactive threshold PKC secure under chosen ciphertext attack, in the random-oracle model and under the DDH intractability assumption [25] .  ...  Stronger notions of security of centralized encryption schemes, namely security against 'Lunch-time Attacks' and 'chosen ciphertext attacks' (CCA) were defined, constructed, and studied in [33, 38, 19  ... 
doi:10.1007/3-540-48910-x_7 fatcat:psosdgik2ffchjhkq2b4opp7ai

An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack [chapter]

Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
2003 Lecture Notes in Computer Science  
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. Fazio [9] .  ...  In addition, our scheme is secure against adaptive chosen ciphertext attack under only the decision Diffie-Hellman (DDH) assumption and the collision-resistant hash function H assumption, whereas the DF  ...  Security against adaptive chosen ciphertext attack An adversary A in an adaptive chosen ciphertext attack (CCA2) is a probabilistic, poly-time oracle query machine.  ... 
doi:10.1007/978-3-540-40061-5_23 fatcat:w3hefl7hqrc2xj2nafokytfafi

Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack

Ronald Cramer, Victor Shoup
2003 SIAM journal on computing (Print)  
The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions.  ...  This paper is a significantly revised and extended version of the extended abstract "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack" [R. Cramer and V.  ...  insecure against adaptive chosen ciphertext attack.  ... 
doi:10.1137/s0097539702403773 fatcat:gnx4j7stunhx5ejl7fbdyfrj3i

Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) [chapter]

Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
2001 Lecture Notes in Computer Science  
This paper presents a new type of powerful cryptanalytic attacks on public-key cryptosystems, extending the more commonly studied adaptive chosen-ciphertext attacks.  ...  In the new attacks, an adversary is not only allowed to submit to a decryption oracle (valid or invalid) ciphertexts of her choice, but also to emit a "dump query" prior to the completion of a decryption  ...  Definition 2 (Strong [Static/Adaptive] Chosen-Ciphertext Attack). A strong static chosen-ciphertext attack consists of the following scenario: 1.  ... 
doi:10.1007/3-540-45325-3_11 fatcat:k4vlq5w4dbgixgte4unuknx3my

Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack [article]

Mohd Anuar Mat Isa, Habibah Hashim
2014 pre-print
Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer  ...  We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack.  ...  We add the timing-attack in an Adaptive Chosen Ciphertext Attacks (CCA2) model. B.  ... 
doi:10.13140/rg.2.1.1699.4800 arXiv:1409.6556v1 fatcat:petq4rnohnenxehaabubqrcc3m

Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks [chapter]

Yuliang Zheng, Jennifer Seberry
Advances in Cryptology — CRYPTO' 92  
In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, ezcept for t h e exact object ciphertext to becryptanalyzed.  ...  This paper presents three mcthods for strengthening public key cryptosystems in such a way t,hat they become secure against adaptiuely chosen ciphertext attacks.  ...  application where adaptively chosen ciphertext attacks would b e a considerable threat.  ... 
doi:10.1007/3-540-48071-4_20 dblp:conf/crypto/ZhengS92 fatcat:ynips7jm3jdk5d2o3gqea7xvp4
« Previous Showing results 1 — 15 out of 9,751 results