skip to main content
10.1145/100216.100273acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Public-key cryptosystems provably secure against chosen ciphertext attacks

Authors Info & Claims
Published:01 April 1990Publication History
First page image

References

  1. {1} W. Alexi, B. Chor, O. Goldreich and C. Schnorr, RSA/Rabin Bits are 1/2 + 1/poly Secure, Siam Journal on Computing, 17(2) (1988), pp. 194-209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. {2} M. Bellare and S. Goldwasser, New Paradigms for Digital Signatures and Message Authentication based on Noninteractive Zero-knowledge Proofs, Crypto 89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. {3} M. Bellare and S. Micali, How to Sign Given Any Trapdoor Function, Proc. 20th Annual Symposium on the Theory of Computing, Chicago, 1988, pp. 32-42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. {4} Blum M., P. Feldman and S. Micali, Non-Interactive Zero-Knowledge Proof Systems, Proc. 20th Annual Symposium on the Theory of Computing, Chicago, 1988, pp. 103-112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} M. Blum, A. De Santis, S. Micali and, G. Persiano, Non-Interactive Zero-Knowledge, Manuscript.Google ScholarGoogle Scholar
  6. {6} M. Blum and S. Goldwasser, An Efficient Probabilistic Public-key Encryption that Hides All Partial Information , Proc. of Crypto 84, pp. 289-299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. {7} A. De Santis, S. Micali and G. Persiano, Non-Interactive Zero-Knowledge Proof Systems Proc. of Crypto 87. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {8} W. Diffie and M. Hellman, New Directions in Cryptography , IEEE Trans. on Information Theory 22(6), 1976, pp. 644-654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {9} U. Feige and A. Shamir, Witness Hiding and Witness Indistinguishability, STOC 1990.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. {10} U. Feige, A. Fiat and A. Shamir, Zero Knowledge Proofs of ldentity, J. of Cryptology 1 (2), pp. 77-94. (Preliminary version in STOC 87). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. {11} Z. Galil, S. Haber and M. Yung, Symmetric Public-key Cryptosystems, Submitted to J. of Cryptology, (preliminary version in Crypto 85). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. {12} O. Goldreich, A Uniform Complexity Encryption and Zero-knowledge, Technion CS-TR 570, June 1989.Google ScholarGoogle Scholar
  13. {13} O. Goldreich S. Goldwasser and S. Micali, How to Construct Random Functions, J. of the ACM 33 (1986), pp. 792-807. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. {14} O. Goldreich and H. Krawczyk, On the Composition of Zero-knowledge Proof Systems, Technion CS-TR 568, June 1989. (To appear ICALP 90). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. {15} O. Goldreich and L. Levin, A Hard Predicate for All One-way Functions, Proc. 21st Annual Symposium on the Theory of Computing, Seattle, 1989, pp. 25-32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. {16} S. Goldreich, S. Micali and A. Wigderson, Proofs that Yield Nothing But their Validity, and a Methodology of Cryptographic Protocol Design, Proceedings of the 27th Symposium on the Foundation of Computer Science, 1986, pp. 174-187.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. {17} S. Goldwasser and S. Micali, Probabilistic Encryption J. Com. Sys. Sci. 28 (1984), pp. 270-299.Google ScholarGoogle ScholarCross RefCross Ref
  18. {18} S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, Siam J. on Computing, 18(1) (1989), pp. 186-208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. {19} S. Goldwasser, S. Micali and R. Rivest, A Secure Digital Signature Scheme, Siam Journal on Computing, Vol. 17, 2 (1988), pp. 281-308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. {20} S. Goldwasser, S. Micali and P. Tong, Why and How to Establish a Private Code on a Public Network, Proceedings of the 23rd Symposium on the Foundation of Computer Science, 1982, pp. 134-144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. {21} L. Levin, One-way Functions and Pseudo-random Generators , Combinatorica 7 (1987), pp. 357-363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. {22} R. Merkle and M. Hellman, Hiding Information and Signatures in Trapdoor Knapsacks, IEEE Trans. on Information Theory, vol. IT-24, 5 (1978), pp. 525-530.Google ScholarGoogle Scholar
  23. {23} S. Micali, Personal Communication, February 1990.Google ScholarGoogle Scholar
  24. {24} S. Micali and C. Rackoff and R. Sloan, Notions of Security of Public-Key Cryptosystems, SIAM J. on Computing 17(2) 1988, pp. 412-426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. {25} M. Naor and M. Yung, Universal One-way Hash Functions and their Cryptographic Applications, Proc. 21st Annual Symposium on the Theory of Computing, Seattle, 1989, pp. 33-43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. {26} M. O. Rabin, Digital Signatures and Public Key Functions as Intractable as Factoring, Technical Memo TM- 212, Lab. for Computer Science, MIT, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. {27} C. Rackoff and D. Simon, Manuscript, 1990.Google ScholarGoogle Scholar
  28. {28} R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of ACM, 21 (1978), pp. 120-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. {29} J. Rompel, One-way Function are Necessary and Sufficient for Signatures, STOC 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. {30} M. Tompa and H. Woll, Random Self Reducibility and Zero-knowledge Interactive Proofs of Knowledge, Proceedings of the 28th Symposium on the Foundation of Computer Science, 1987.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. {31} A. C. Yao, Theory and Applications of Trapdoor functions , Proceedings of the 23th Symposium on the Foundation of Computer Science, 1982, pp. 80-91.Google ScholarGoogle Scholar
  32. {32} M. Yung, Cryptoprotocols: Subscription To a Public Key, Proceedings of Crypto 84, Springer-Verlag, 1985, pp. 439- 453. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. {33} S. Zachos, Probabilistic Quantifiers, Adversaries and Complexity Classes: an overview, Proceeding of Structure in Complexity, Springer Verlag, 1986, pp. 383-400. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Public-key cryptosystems provably secure against chosen ciphertext attacks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of Computing
              April 1990
              574 pages
              ISBN:0897913612
              DOI:10.1145/100216

              Copyright © 1990 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 April 1990

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate1,469of4,586submissions,32%

              Upcoming Conference

              STOC '24
              56th Annual ACM Symposium on Theory of Computing (STOC 2024)
              June 24 - 28, 2024
              Vancouver , BC , Canada

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader