Provable security for public key schemes

被引:16
|
作者
Pointcheval, D [1 ]
机构
[1] Ecole Normale Super, Dept Informat, F-75230 Paris, France
来源
关键词
DIGITAL-SIGNATURES; ENCRYPTION; PROOFS; RSA; CRYPTOSYSTEM; IDENTIFICATION; COMPLEXITY; PROTOCOLS; NOTIONS; OAEP;
D O I
10.1007/3-7643-7394-6_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the appearance of public-key cryptography in the Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for a long time, the simple fact that a cryptographic algorithm had withstood cryptanalytic attacks for several years was considered as a kind of validation. But some schemes took a long time before being widely studied, and maybe thereafter being broken. A much more convincing line of research has tried to provide "provable" security for cryptographic protocols, in a complexity theory sense: if one can break the cryptographic protocol, one can efficiently solve the underlying problem. Unfortunately, this initially was a purely theoretical work: very few practical schemes could be proven in this so-called "standard model" because such a security level rarely meets with efficiency. Ten years ago, Bellare and Rogaway proposed a trade-off to achieve some kind of validation of efficient schemes, by identifying some concrete cryptographic objects with ideal random ones. The most famous identification appeared in the so-called "random-oracle model". More recently, another direction has been taken to prove the security of efficient schemes in the standard model (without any ideal assumption) by using stronger computational assumptions. In these lectures, we focus on practical asymmetric protocols together with their "reductionist" security proofs, mainly in the random-oracle model. We cover the two main goals that public-key cryptography is devoted to solve: authentication with digital signatures, and confidentiality with public-key encryption schemes.
引用
收藏
页码:133 / 190
页数:58
相关论文
共 50 条
  • [1] XTR+:: A provable security public key cryptosystem
    Wang, Zehui
    Zhang, Zhiguo
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 534 - +
  • [2] Provable security of proxy signature schemes
    Gu, CX
    Zhu, YF
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
  • [3] On the provable security of BEAR and LION schemes
    Maines, Lara
    Piva, Matteo
    Rimoldi, Anna
    Sala, Massimiliano
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2011, 22 (5-6) : 413 - 423
  • [4] On the security of two public key watermarking schemes
    Wu, YD
    Bao, F
    Xu, CS
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 975 - 979
  • [5] On the provable security of BEAR and LION schemes
    Lara Maines
    Matteo Piva
    Anna Rimoldi
    Massimiliano Sala
    Applicable Algebra in Engineering, Communication and Computing, 2011, 22 : 413 - 423
  • [6] Improvement on the XTP public key cryptosystem and communication protocol of provable security
    Wang, Ze-Hui
    Tongxin Xuebao/Journal on Communications, 2007, 28 (01): : 22 - 27
  • [7] A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security
    Su, Shenghui
    Lu, Shuwang
    Xu, Maozhi
    COMPUTING AND COMBINATORICS, 2015, 9198 : 674 - 686
  • [8] Provable security authentication scheme based on public key for heterogeneous wireless network
    Hou, Hui-Fang
    Liu, Guang-Qiang
    Ji, Xin-Sheng
    Zhang, Qiu-Wen
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (10): : 2385 - 2391
  • [9] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [10] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182