This paper addresses the security of public-key cryptosystems in a "multi-user" setting, namely in the presence of attacks involv-ing the encryption of related messages under different public keys, as exemplified by Hºastad's classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sense of "indistinguishability," thereby pin-pointing many schemes guaranteed to be secure against Hºastad-type attacks. We then highlight the importance, in practice, of considering and improving the concrete security of the general reduction, and present such improvements for two Diffie-Hellman based schemes, namely El Gamal ...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of...
Devising public key cryptosystems that are secure against chosen ciphertext attacks has been the sub...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of...
This paper presents an attack in the multi-user setting on various public-key encryption schemes sta...
Security is one of the most important concern to the information and data sharing for companies, ban...
With the rapid development of information and network technologies, communication security has becom...
We construct the first public-key encryption scheme whose chosen-ciphertext (i.e., IND-CCA) security...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
We compare the relative strengths of popular notions of security for public-key encryption schemes. ...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
This paper deals with new problems which arise in the application of cryptography to computer commu-...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of...
Devising public key cryptosystems that are secure against chosen ciphertext attacks has been the sub...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of...
This paper presents an attack in the multi-user setting on various public-key encryption schemes sta...
Security is one of the most important concern to the information and data sharing for companies, ban...
With the rapid development of information and network technologies, communication security has becom...
We construct the first public-key encryption scheme whose chosen-ciphertext (i.e., IND-CCA) security...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
We compare the relative strengths of popular notions of security for public-key encryption schemes. ...
Since their introduction, the notions of indistinguishability and non-malleability have been changed...
This paper deals with new problems which arise in the application of cryptography to computer commu-...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of...
Devising public key cryptosystems that are secure against chosen ciphertext attacks has been the sub...
The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of...