DC Field | Value | Language |
---|---|---|
dc.contributor.author | Baek, Joonsang | ko |
dc.contributor.author | Lee, Byoungcheon | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.date.accessioned | 2009-12-28T06:22:11Z | - |
dc.date.available | 2009-12-28T06:22:11Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2000-12 | - |
dc.identifier.citation | ETRI JOURNAL, v.22, no.4, pp.25 - 31 | - |
dc.identifier.issn | 1225-6463 | - |
dc.identifier.uri | http://hdl.handle.net/10203/15886 | - |
dc.description.abstract | Design of secure and efficient public-key encryption schemes under weaker computational assumptions has been regarded as an important and challenging task As far as EIGamal-type encryption schemes are concerned, some variants of the original EIGamal encryption scheme based on weaker computational assumption have been proposed: Although security of the EIGamal variant of Fujisaki-Okamoto public-key encryption scheme and Cramer and Shoup's encryption scheme is based on the Decisional Diffie-Hellman Assumption (DDH-A), security of the recent Pointcheval's EIGamal encryption variant is based on the Computational Diffie-Hellman Assumption (CDH-A), which is known to be weaker than DDH-A. In this paper, me propose new EIGamal encryption variants whose security is based on CDH-A and the Elliptic Curve Computational Diffie-Hellman Assumption (EC-CDH-A), Also, we show that the proposed variants are secure against the adaptive chosen-ciphertext attack in the random oracle model. An important feature of the proposed variants is length-efficiency which provides shorter ciphertexts than those of other schemes. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | ELECTRONICS TELECOMMUNICATIONS RESEARCH INST | - |
dc.subject | CRYPTOSYSTEM | - |
dc.title | Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption | - |
dc.type | Article | - |
dc.identifier.wosid | 000165868300003 | - |
dc.identifier.scopusid | 2-s2.0-0034513604 | - |
dc.type.rims | ART | - |
dc.citation.volume | 22 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 25 | - |
dc.citation.endingpage | 31 | - |
dc.citation.publicationname | ETRI JOURNAL | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Baek, Joonsang | - |
dc.contributor.nonIdAuthor | Lee, Byoungcheon | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordPlus | CRYPTOSYSTEM | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.