On the security of an RSA based encryption scheme

被引:0
|
作者
Müller, S [1 ]
机构
[1] Univ Klagenfurt, Dept Math, A-9020 Klagenfurt, Austria
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In [21] some simple modifications of the RSA, respectively Dickson/LUC, cryptosystems have been presented which are practical and provably as secure in difficulty as factorizing their modulus. Similar to Rabin's provable secure cryptosystem, these schemes are vulnerable to chosen ciphertext attacks. We are going to provide a method for immunizing the RSA based system against adaptive chosen ciphertext attacks and simultaneously provide information authentication capability. By means of probabilistic encoding, the scheme achieves semantic security and plaintext awareness in the standard (i.e. non random oracle) model under the assumption of a collision-resistant hash function and the factorization intractability of the receiver's modulus.
引用
收藏
页码:135 / 148
页数:14
相关论文
共 50 条
  • [1] On the security of RSA encryption in TLS
    Jonsson, J
    Kaliski, BS
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 127 - 142
  • [2] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [3] On the security of a RSA-based certificateless signature scheme
    He, Debiao
    Khan, Muhammad Khurram
    Wu, Shuhua
    International Journal of Network Security, 2014, 16 (01) : 78 - 80
  • [4] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [5] Substation Communication security Research Based on Hybrid Encryption of DES and RSA
    Wang Fangfang
    Wang Huazhong
    Chen Dongqing
    Peng Yong
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 437 - 441
  • [6] RSA Based Biometric Encryption System Using FPGA for Increased Security
    Bourg, Michael
    Govindan, Pramod
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 169 - 172
  • [7] Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm
    Jiao, Kaixin
    Ye, Guodong
    Dong, Youxia
    Huang, Xiaoling
    He, Jianqing
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [8] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [9] An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
    Lin, Riguang
    Li, Sheng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [10] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATION SCIENCES, 2014, 278 : 577 - 587