搜索结果: 1-9 共查到“ciphertext attacks”相关记录9条 . 查询时间(0.062 秒)
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Boolean Satisfiability Satisfiability Modulo Theories Application
2019/8/26
In this work we investigate the problem of automating the development of adaptive chosen ciphertext attacks on systems that contain vulnerable format oracles. Unlike previous attempts, which simply au...
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers
Feistel cipher Quantum chosen-ciphertext attacks Simon's algorithm
2018/12/19
Seminal results by Luby and Rackoff show that the 3-round Feistel cipher is secure against chosen-plaintext attacks (CPAs), and the 4-round version is secure against chosen-ciphertext attacks (CCAs). ...
On Quantum Chosen-Ciphertext Attacks and Learning with Errors
chosen-ciphertext security learning with errors quantum attacks
2018/12/11
Large-scale quantum computing is a significant threat to classical public-key cryptography. In strong “quantum access” security models, numerous symmetric-key cryptosystems are also vulnerable. We con...
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks
identity-based encryption chosen-ciphertext security tight security reductions
2018/11/16
We propose the first identity-based encryption (IBE) scheme that is (almost) tightly secure against chosen-ciphertext attacks. Our scheme is efficient, in the sense that its ciphertext overhead is onl...
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
simulation-based security selective opening security for receivers chosen-ciphertext attacks
2018/8/21
Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the us...
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
receiver selective opening chosen ciphertext security hash proof system
2016/12/7
We present a general construction of RSO security against chosen ciphertext attacks (RSO-CCA) by combining any RSO secure scheme against chosen plaintext attacks (RSO-CPA) with any regular CCA secure ...
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
public key encryption scheme plaintext ciphertext attacks
2009/6/9
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding
open problem of "circular encryption," by presenting a public key encryption scheme
and proving that it...
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
ID-based encryption chosen ciphertext security gap bilinear Diffie-Hellman problem
2009/3/9
ID-based encryption allows for a sender to encrypt a message
to an identity without access to a public key certificate. Based on the
bilinear pairing, Boneh and Franklin proposed the first practical...
Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems
Countering chosen-ciphertext attacks noncommutative polly cracker-type cryptosystems
2009/3/9
In [2], Stanislav Bulygin presents a chosen-ciphertext attack against
certain instances of noncommutative polly cracker-type cryptosystems which
were proposed in [7] and [9]. In this article, we pre...