Adding a Schnorr signature to ElGamal encryption is a popular proposal aiming at thwarting chosen-ciphertext attacks by rendering the scheme plaintext-aware. However, there is no known security proof for the resulting scheme, at least not in a weaker model than the one obtained by combining the Random Oracle Model (ROM) and the Generic Group Model (Schnorr and Jakobsson, ASIACRYPT 2000). In this paper, we propose a very simple modification to Schnorr-Signed ElGamal encryption such that the resulting scheme is semantically secure under adaptive chosen-ciphertext attacks (IND-CCA2-secure) in the ROM under the Decisional Diffie-Hellman assumption. In fact, we even prove that our new scheme is plaintext-aware in the ROM as defined by Bellare et...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
This article revisits the original designated confirmer signature scheme of Chaum. Following the sam...
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we...
The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive Schnorr p...
Abstract. The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive...
This paper proposes a variant of the ElGamal public key cryptosystem which is secure against chosen ...
Abstract. The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cr...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem...
In this paper we examine the security criteria for a KEM and a DEM that are su±cient for the overall...
We introduce novel security proofs that use combinatorial counting arguments rather than reductions ...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
This article revisits the original designated confirmer signature scheme of Chaum. Following the sam...
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we...
The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive Schnorr p...
Abstract. The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive...
This paper proposes a variant of the ElGamal public key cryptosystem which is secure against chosen ...
Abstract. The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cr...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
International audienceIndistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now ...
The notion of plaintext awareness (PA) has many applications in public key cryptography: it offers u...
Abstract. Indistinguishability under adaptive chosen-ciphertext attack (IND-CCA) is now consid-ered ...
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem...
In this paper we examine the security criteria for a KEM and a DEM that are su±cient for the overall...
We introduce novel security proofs that use combinatorial counting arguments rather than reductions ...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
We describe a practical identity-based encryption scheme that is secure in the standard model agains...
This article revisits the original designated confirmer signature scheme of Chaum. Following the sam...