Provable security for public key schemes

被引:16
|
作者
Pointcheval, D [1 ]
机构
[1] Ecole Normale Super, Dept Informat, F-75230 Paris, France
来源
关键词
DIGITAL-SIGNATURES; ENCRYPTION; PROOFS; RSA; CRYPTOSYSTEM; IDENTIFICATION; COMPLEXITY; PROTOCOLS; NOTIONS; OAEP;
D O I
10.1007/3-7643-7394-6_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the appearance of public-key cryptography in the Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for a long time, the simple fact that a cryptographic algorithm had withstood cryptanalytic attacks for several years was considered as a kind of validation. But some schemes took a long time before being widely studied, and maybe thereafter being broken. A much more convincing line of research has tried to provide "provable" security for cryptographic protocols, in a complexity theory sense: if one can break the cryptographic protocol, one can efficiently solve the underlying problem. Unfortunately, this initially was a purely theoretical work: very few practical schemes could be proven in this so-called "standard model" because such a security level rarely meets with efficiency. Ten years ago, Bellare and Rogaway proposed a trade-off to achieve some kind of validation of efficient schemes, by identifying some concrete cryptographic objects with ideal random ones. The most famous identification appeared in the so-called "random-oracle model". More recently, another direction has been taken to prove the security of efficient schemes in the standard model (without any ideal assumption) by using stronger computational assumptions. In these lectures, we focus on practical asymmetric protocols together with their "reductionist" security proofs, mainly in the random-oracle model. We cover the two main goals that public-key cryptography is devoted to solve: authentication with digital signatures, and confidentiality with public-key encryption schemes.
引用
收藏
页码:133 / 190
页数:58
相关论文
共 50 条
  • [21] XTR+:: A provable secure public key cryptosystem
    Wang Ze-hui
    Zhang Zhi-guo
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1359 - 1362
  • [22] An Efficient Authentication Key Agreement Protocol with Provable Security for VANET
    Qiao Z.-R.
    Yang Q.-L.
    Zhou Y.-W.
    Yang B.
    Gu C.-X.
    Zhang M.-W.
    Xia Z.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (05): : 929 - 944
  • [23] A General Architecture for Multiserver Authentication Key Agreement with Provable Security
    Zhang, Yunru
    Luo, Min
    Choo, Kim-Kwang Raymond
    He, Debiao
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [24] A provable-security treatment of the key-wrap problem
    Rogaway, Phillip
    Shrimpton, Thomas
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 373 - 390
  • [25] Secret public key schemes
    Patarin, J
    PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 221 - 237
  • [26] Security of the center in key distribution schemes
    Kurosawa, K
    Okada, K
    Sakano, K
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 333 - 341
  • [28] A new aspect for security notions: Secure randomness in public-key encryption schemes
    Koshiba, T
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 87 - 103
  • [29] A public key cryptosystem based on three new provable problems
    Su, Shenghui
    Lu, Shuwang
    THEORETICAL COMPUTER SCIENCE, 2012, 426 : 91 - 117
  • [30] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18