Contemporary Cryptology Provable Security for Public Key Schemes

作者: David Pointcheval

DOI:

关键词: Cryptographic primitiveMathematicsComputer securityCryptographic protocolComputational hardness assumptionPublic-key cryptographySecurity of cryptographic hash functionsStandard model (cryptography)Theoretical computer scienceProvable securityCryptography

摘要: Since the appearance of public-key cryptography in Die-Hellman seminal paper, many schemes have been proposed, but broken. Indeed, for a long time, simple fact that cryptographic algorithm had withstood cryptanalytic attacks several years was considered as kind validation. But some took time before being widely studied, and maybe thereafter A much more convincing line research has tried to provide \provable" security proto- cols, complexity theory sense: if one can break protocol, ecien tly solve underlying problem. Unfortunately, this initially purely theoretical work: very few practical could be proven so-called \standard model" because such level rarely meets with eciency . Ten ago, Bellare Rogaway proposed trade-o achieve validation t schemes, by identifying concrete objects ideal random ones. The most famous identication appeared \random-oracle model". More recently, another direction taken prove standard model (without any assumption) using stronger computational assumptions. In these lectures, we focus on asymmetric protocols together their \reductionist" proofs, mainly random-oracle model. We cover two main goals is devoted solve: authentication digital signatures, conden tiality encryption schemes.

参考文章(70)
David Pointcheval, How to Encrypt Properly with RSA ,(2002)
Serge Vaudenay, David Pointcheval, On Provable Security for Digital Signature Algorithms ,(1996)
Kazuo Ohta, Tatsuaki Okamoto, On Concrete Security Treatment of Signatures Derived from Identification international cryptology conference. pp. 354- 369 ,(1998) , 10.1007/BFB0055741
Arjen K. Lenstra, Eric R. Verheul, Selecting Cryptographic Key Sizes public key cryptography. pp. 446- 465 ,(2000) , 10.1007/978-3-540-46588-1_30
M. Bellare, Optimal Asymmetric Encryption-How to Encrypt with RSA theory and application of cryptographic techniques. ,(1995)
David Pointcheval, About Generic Conversions from any Weakly Secure Encryption Scheme into a Chosen-Ciphertext Secure Scheme Fourth Conference on Algebraic Geometry, Number Theory, Coding Theory and Cryptography. ,(2001)
David Pointcheval, Practical Security in Public-Key Cryptography international conference on information security and cryptology. pp. 1- 17 ,(2001) , 10.1007/3-540-45861-1_1