Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

The notion of security for probabilistic cryptosystems

Published: 01 April 1988 Publication History
  • Get Citation Alerts
  • Abstract

    No abstract available.

    Cited By

    View all

    Recommendations

    Reviews

    Graham K. Jenkins

    This paper was originally written in 1986, and must therefore be regarded as somewhat dated. It is commendable, however, for its lucid explanations of several different public-key scenarios. The paper introduces the notions of one- and three-pass systems for the establishment of secure communications sessions. Three formal definitions of security for public-key cryptosystems are then examined, two from Goldwasser and Micali and one from Yao. It is shown that all three are, in fact, equivalent; the mathematical basis for this claim is presented in some detail. Support for the work in this paper came from the US Army Research Office, the National Science Foundation, and IBM and General Electric grants. The reader might, in consequence, expect its content to have some immediate practical application. It is indeed unfortunate that such an expectation is not realized. Those engaged in theoretical studies relating to public-key cryptosystems, though, may find that this paper provides a valuable introduction to the subject.

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image SIAM Journal on Computing
    SIAM Journal on Computing  Volume 17, Issue 2
    Special issue on cryptography
    April 1988
    248 pages

    Publisher

    Society for Industrial and Applied Mathematics

    United States

    Publication History

    Published: 01 April 1988

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)The Local Forking Lemma and Its Application to Deterministic EncryptionAdvances in Cryptology – ASIACRYPT 201910.1007/978-3-030-34618-8_21(607-636)Online publication date: 8-Dec-2019
    • (2018)A Black-Box Construction of Non-malleable Encryption from Semantically Secure EncryptionJournal of Cryptology10.1007/s00145-017-9254-z31:1(172-201)Online publication date: 1-Jan-2018
    • (2018)Semantically Secure Anonymity: Foundations of Re-encryptionSecurity and Cryptography for Networks10.1007/978-3-319-98113-0_14(255-273)Online publication date: 5-Sep-2018
    • (2017)NaorYung paradigm with shared randomness and applicationsTheoretical Computer Science10.1016/j.tcs.2017.06.019692:C(90-113)Online publication date: 5-Sep-2017
    • (2016)A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding ProtocolProceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/2939918.2939919(121-133)Online publication date: 18-Jul-2016
    • (2016)Naor-Yung Paradigm with Shared Randomness and ApplicationsProceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 984110.1007/978-3-319-44618-9_4(62-80)Online publication date: 31-Aug-2016
    • (2013)Constructing Confidential Channels from Authenticated Channels--Public-Key Encryption RevisitedPart I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 826910.1007/978-3-642-42033-7_8(134-153)Online publication date: 1-Dec-2013
    • (2012)Identity-based extractable hash proofs and their applicationsProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_10(153-170)Online publication date: 26-Jun-2012
    • (2011)Key-dependent message security for division functionProceedings of the 5th international conference on Provable security10.5555/2042756.2042782(297-308)Online publication date: 16-Oct-2011
    • (2011)A new proxy signcryption scheme using warrantsInternational Journal of Intelligent Engineering Informatics10.1504/IJIEI.2011.0441001:3/4(309-327)Online publication date: 1-Dec-2011
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media