Advertisement

The Analysis of Zheng-Seberry Scheme

  • David Soldera
  • Jennifer Seberry
  • Chengxin Qu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Abstract

The Zheng-Seberry (ZS) encryption scheme was published in 1993 and was one of the first practical schemes that was considered secure against a chosen ciphertext adversary. This paper shows some problems that the semantic security of the one-way hash variant of the ZS scheme is insecure on some special circumstances. Attempts to modify the ZS scheme resulted on an El-Gamal variant that is provably secure in the random oracle model.

Keywords

Hash Function Random Oracle Random Oracle Model Challenge Ciphertext Decryption Oracle 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    M. Bellare, A. Desai, D. Pointcheval and P. Rogaway, Relations among notions of security for public-key encryption schemes CRYPTO’98. LNCS 1462, pg 26–45. Springer-Verlag, California, 1998.Google Scholar
  2. [2]
    M. Bellare and P. Rogaway, Optimal asymmetric encryption-how to encrypt with RSA EUROCRYTP’94. LNCS 950, pg 92–111. Springer-Verlag, 1994.Google Scholar
  3. [3]
    D. Boneh, The decision Diffie-Hellman problem, Third Algorithmic Number Theory Symposium (ANTS)LNCS 1423, Springer-Verlag, 1998..Google Scholar
  4. [4]
    R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, CRYPTO’98. LNCS 1462, pg 13–25. Springer-Verlag, California, 1998.Google Scholar
  5. [5]
    T. El Gamal, A public key cryptosystem and signature schme based on discrete logarithms, IEEE Trans. Inform. Theory, 31:469–472, 1985.CrossRefMathSciNetzbMATHGoogle Scholar
  6. [6]
    V. Shoup, Using hash functions as a hedge against chosen ciphertext attack EUROCRYPT’00. LNCS 1807, pg 275–288. Springer-Verlag, 2000.Google Scholar
  7. [7]
    Y. Tsiounis and M. Yung, ”On the security of El-Gamal based encryption, PKC’98. LNCS 1431, Spinger-Verlag, Japan, 1998.Google Scholar
  8. [8]
    Y. Zheng, Improved public key crypto systems secure against chosen ciphertext attacks, Technical Report 94-1, University of Wollongong, 1994.Google Scholar
  9. [9]
    Y. Zheng and J. Seberry, Immunizing public key cryptosystems against chosen ciphertext attacks, IEEE Journal on Selected Areas in Communications, 1993. 11(5): p. 715–724.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • David Soldera
    • 1
  • Jennifer Seberry
    • 1
  • Chengxin Qu
    • 2
  1. 1.Centre for Computer Security ResearchUniversity of WollongongAustralia
  2. 2.School of Mathematical and Computer ScienceUniversity of New EnglandArmidaleAustralia

Personalised recommendations