Security Analysis of ElGamal Implementations

被引:3
|
作者
El Laz, Mohamad [1 ]
Gregoire, Benjamin [1 ]
Rezk, Tamara [1 ]
机构
[1] Inria Sophia Antipolis Mediterranee, Valbonne, France
关键词
ElGamal; DDH Assumption; Quadratic Residues; Voting Systems; Message Encoding;
D O I
10.5220/0009817103100321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ElGamal encryption scheme is not only the most extensively used alternative to RSA, but is also almost exclusively used in voting systems as an effective homomorphic encryption scheme. Being easily adaptable to a wide range of cryptographic groups, the ElGamal encryption scheme enjoys homomorphic properties while remaining semantically secure. This is subject to the upholding of the Decisional Diffie-Hellman (DDH) assumption on the chosen group. We analyze 26 libraries that implement the ElGamal encryption scheme and discover that 20 of them are semantically insecure as they do not respect the Decisional Diffie-Hellman (DDH) assumption. From the five libraries that do satisfy the DDH assumption, we identify and compare four different message encoding and decoding techniques.
引用
收藏
页码:310 / 321
页数:12
相关论文
共 50 条
  • [21] ElGamal type digital multisignature schemes and its security
    Lu, Jianzhu
    Chen, Huoyan
    Lin, Fei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2000, 37 (11): : 1335 - 1339
  • [22] Security and cryptographic hardware implementations
    Sklavos, N
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769
  • [23] Provable implementations of security protocols
    Gordon, Andrew D.
    21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
  • [24] Security implementations in the healthcare enterprise
    Brill, R
    Leetz, W
    CARS 2005: Computer Assisted Radiology and Surgery, 2005, 1281 : 290 - 295
  • [25] New Limits of Provable Security and Applications to ElGamal Encryption
    Schage, Sven
    ADVANCES IN CRYPTOLOGY, PT IV, EUROCRYPT 2024, 2024, 14654 : 255 - 285
  • [26] A Security-Mediated Encryption Scheme Based on ElGamal Variant
    Tea, Boon Chian
    Ariffin, Muhammad Rezal Kamel
    Abd Ghafar, Amir Hamzah
    Asbullah, Muhammad Asyraf
    MATHEMATICS, 2021, 9 (21)
  • [27] Validation of security protocol implementations from security objectives
    Fu, Yulong
    Kone, Ousmane
    COMPUTERS & SECURITY, 2013, 36 : 27 - 39
  • [28] An analysis of the Intel 80x86 security architecture and implementations
    Sibert, O
    Porras, PA
    Lindell, R
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (05) : 283 - 293
  • [29] Security analysis of TLS implementations based on state machine learning algorithm
    Bi X.
    Tang C.
    2018, Chinese Institute of Electronics (40): : 2810 - 2815
  • [30] ElGamal Broadcasting Multi-Signcryption Protocol with UC Security
    Li J.
    Yu H.
    Xie Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (05): : 1101 - 1111