搜索结果: 1-15 共查到“军事学 ElGamal”相关记录24条 . 查询时间(0.036 秒)
ElGamal cryptosystem is typically developed in the multiplicative group Z∗pZp∗ (pp is a prime number), but it can be applied to the other groups in which discrete logarithm problem should ...
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Elgamal cryptosystem Side-channel attacks Montgomery Ladder
2018/8/21
In 2005, Yen et al. proposed the first N−1N−1 attack on the modular exponentiation algorithms such as BRIP and square-and-multiply-always methods. This attack makes use of the ciphertext N...
Other free sums are 1-way under plausible assumptions: elliptic curve discrete logs, integer factoring, and secure small-key Wegman--Carter--Shoup authentication. Yet other free sums of 1-way function...
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
implementation Leakage-resilient cryptography
2016/1/6
Leakage-resilient cryptography aims to extend the rigorous
guarantees achieved through the provable security paradigm to physical
implementations. The constructions and mechanisms designed on basis
...
Attribute-Based Versions of Schnorr and ElGamal
attribute-based cryptography Discrete Logarithm setting verifiable computation
2016/1/3
We design in this paper the first attribute-based cryptosystems that work in the classical Discrete
Logarithm, pairing-free, setting. The attribute-based signature scheme can be seen as an extension ...
On the Hardness of Proving CCA-security of Signed ElGamal
proofs of knowledge sigma protocols fiat-shamir
2015/12/29
The well-known Signed ElGamal scheme consists of ElGamal
encryption with a non-interactive Schnorr proof of knowledge. While this
scheme should be intuitively secure against chosen-ciphertext attack...
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Secure outsourcing data privacy cloud computing
2015/12/22
This paper addresses the secure outsourcing problem for large-scale matrix computation to
a public cloud. We propose a novel public-key weave ElGamal encryption (WEE) scheme for encrypting
a matrix ...
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption
Leakage Resilient Cryptography ElGamal Encryption Mathematical Realization
2013/4/18
Leakage resilient cryptography aims to address the issue of inadvertent and unexpected information leakages from physical cryptographic implementations. At Asiacrypt 2010, E.Kiltz et al. [1] presented...
Can one use the discrete logarithm problem in matrix groups, to build a better and secure cryptosystem? We argue, it is indeed the case. This makes the group of circulant matrices suitable and attract...
Privacy Preserving Multiset Union with ElGamal Encryption
Privacy Multiset Union ElGamal Encryption
2009/6/10
The privacy preserving multiset union (PPMU) protocol allows a set of parties,
each with a multiset, to collaboratively compute a multiset union secretly, meaning that any
information other than uni...
We establish the complete complexity landscape surrounding CCA1-security of Elgamal and Damg°ard’s
Elgamal (DEG). Denote by XY [i] the assumption that the adversary, given a non-adaptive oracle acces...
On The Security of The ElGamal Encryption Scheme and Damg°ard’s Variant
ElGamal encryption Damg°ard’s ElGamal variant security proof
2009/6/4
In this paper, we discuss the security of the ElGamal encryption scheme and its variant by
Damg°ard. For the ElGamal encryption, we show that (1) under the generalized knowledge-of-exponent
assumpti...
A SIMPLE GENERALIZATION OF THE ELGAMAL CRYPTOSYSTEM TO NON-ABELIAN GROUPS II
MOR cryptosystem special linear groups
2009/6/2
In this paper I study the MOR cryptosystem using the special
linear group over finite fields. At our current state of knowledge,
I show that the MOR cryptosystem is more secure than the ElGamal
cry...
关于“两类ElGamal型数字签名方案的安全性和性能分析”的讨论
密码分析 数字签名方案 同态攻击
2009/5/5
为了加强ElGamal型数字签名方案的安全性,最近祁明等人对两类ElGamal型数字签名方案的安全性和基于两类签名方案的通行字认证方案进行了分析和讨论,并且提出了两类改进型的方案。本文首先指出了他们提出的第一个p型方案是不安全的,攻击者可以伪造任意消息的数字签名。本文证明了广义ElGamal型数字签名方案都不能抵御代换攻击。本文最后还证明了他们提出的两类改进型方案也不能抵御同态攻击,因而并不具有所...