The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Seung Geol | - |
dc.contributor.author | Herranz, Javier | - |
dc.contributor.author | Hofheinz, Dennis | - |
dc.contributor.author | Hwang, Jung Yeon | - |
dc.contributor.author | Kiltz, Eike | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Yung, Moti | - |
dc.date.accessioned | 2021-09-08T15:25:18Z | - |
dc.date.available | 2021-09-08T15:25:18Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2009-07-31 | - |
dc.identifier.issn | 0020-0190 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/119646 | - |
dc.description.abstract | At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is chosen-ciphertext (CCA2) secure in the standard model. Until now it was unknown if the key encapsulation part of the Kurosawa-Desmedt scheme by itself is still CCA2-secure or not. In this note we answer this question to the negative, namely we present a simple CCA2 attack on the Kurosawa-Desmedt key encapsulation mechanism. Our attack further supports the design paradigm of Kurosawa and Desmedt to build CCA2-secure hybrid encryption from weak key encapsulation. (C) 2009 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.subject | HYBRID ENCRYPTION | - |
dc.subject | DIFFIE-HELLMAN | - |
dc.subject | PARADIGM | - |
dc.subject | SCHEMES | - |
dc.subject | ATTACK | - |
dc.title | The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.ipl.2009.04.007 | - |
dc.identifier.scopusid | 2-s2.0-67649372669 | - |
dc.identifier.wosid | 000268564100002 | - |
dc.identifier.bibliographicCitation | INFORMATION PROCESSING LETTERS, v.109, no.16, pp.897 - 901 | - |
dc.relation.isPartOf | INFORMATION PROCESSING LETTERS | - |
dc.citation.title | INFORMATION PROCESSING LETTERS | - |
dc.citation.volume | 109 | - |
dc.citation.number | 16 | - |
dc.citation.startPage | 897 | - |
dc.citation.endPage | 901 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | HYBRID ENCRYPTION | - |
dc.subject.keywordPlus | DIFFIE-HELLMAN | - |
dc.subject.keywordPlus | PARADIGM | - |
dc.subject.keywordPlus | SCHEMES | - |
dc.subject.keywordPlus | ATTACK | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Hybrid encryption | - |
dc.subject.keywordAuthor | Key encapsulation mechanism | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.