Provable security for public key schemes

被引:16
|
作者
Pointcheval, D [1 ]
机构
[1] Ecole Normale Super, Dept Informat, F-75230 Paris, France
来源
关键词
DIGITAL-SIGNATURES; ENCRYPTION; PROOFS; RSA; CRYPTOSYSTEM; IDENTIFICATION; COMPLEXITY; PROTOCOLS; NOTIONS; OAEP;
D O I
10.1007/3-7643-7394-6_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the appearance of public-key cryptography in the Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for a long time, the simple fact that a cryptographic algorithm had withstood cryptanalytic attacks for several years was considered as a kind of validation. But some schemes took a long time before being widely studied, and maybe thereafter being broken. A much more convincing line of research has tried to provide "provable" security for cryptographic protocols, in a complexity theory sense: if one can break the cryptographic protocol, one can efficiently solve the underlying problem. Unfortunately, this initially was a purely theoretical work: very few practical schemes could be proven in this so-called "standard model" because such a security level rarely meets with efficiency. Ten years ago, Bellare and Rogaway proposed a trade-off to achieve some kind of validation of efficient schemes, by identifying some concrete cryptographic objects with ideal random ones. The most famous identification appeared in the so-called "random-oracle model". More recently, another direction has been taken to prove the security of efficient schemes in the standard model (without any ideal assumption) by using stronger computational assumptions. In these lectures, we focus on practical asymmetric protocols together with their "reductionist" security proofs, mainly in the random-oracle model. We cover the two main goals that public-key cryptography is devoted to solve: authentication with digital signatures, and confidentiality with public-key encryption schemes.
引用
收藏
页码:133 / 190
页数:58
相关论文
共 50 条
  • [41] A Pairing Free Provable Public Key Dual Receiver Encryption Scheme
    Abouelkheir, Eman
    El-Sherbiny, Shamia
    IEEE ACCESS, 2024, 12 : 55918 - 55924
  • [42] A Provable-Security Mutual Authenticated Key Agreement Protocol for Mobile Communication
    Pan Heng
    Li Jing-Feng
    Zheng Qiu-Sheng
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4786 - +
  • [43] ATwo-party Certificateless Authenticated Key Agreement Protocol with provable security
    Li Gui-ying
    Hou Meng-bo
    Zhao Chuan
    Xu Qiu-liang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 559 - 563
  • [44] Pairing-Free Certificateless Key-Insulated Encryption with Provable Security
    Li-Bo He
    Dong-Jie Yan
    Hu Xiong
    Zhi-Guang Qin
    JournalofElectronicScienceandTechnology, 2018, 16 (01) : 50 - 56
  • [45] Security-provable mutually authenticated key agreement protocol in mobile communication
    Deng, Hong-Su
    Zuo, Yi-Qiang
    Zhao, Yi-Ming
    Bao, Zhen-Dong
    Ruan Jian Xue Bao/Journal of Software, 2003, 14 (08): : 1489 - 1494
  • [46] Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective
    Guo, Chun
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (08) : 5260 - 5280
  • [47] Provable and Secure Traditional Public Key Infrastructure-certificateless Public Key Cryptography Heterogeneous Aggregate Signcryption Scheme
    Zhang Yulei
    Wang Huan
    Ma Yanli
    Liu Wenjing
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (05) : 1079 - 1086
  • [48] Robust key-evolving public key encryption schemes
    Tzeng, WG
    Tzeng, ZJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 61 - 72
  • [49] Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption
    Pereira, Mayana
    Dowsley, Rafael
    Hanaoka, Goichiro
    Nascimento, Anderson C. A.
    INFORMATION SECURITY, 2011, 6531 : 299 - +
  • [50] Security of public watermarking schemes for binary sequences
    Li, QM
    Chang, EC
    INFORMATION HIDING, 2003, 2578 : 119 - 128