搜索结果: 1-15 共查到“ElGamal”相关记录29条 . 查询时间(0.062 秒)
ElGamal cryptosystem is typically developed in the multiplicative group Z∗pZp∗ (pp is a prime number), but it can be applied to the other groups in which discrete logarithm problem should ...
New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem
Elgamal cryptosystem Side-channel attacks Montgomery Ladder
2018/8/21
In 2005, Yen et al. proposed the first N−1N−1 attack on the modular exponentiation algorithms such as BRIP and square-and-multiply-always methods. This attack makes use of the ciphertext N...
Other free sums are 1-way under plausible assumptions: elliptic curve discrete logs, integer factoring, and secure small-key Wegman--Carter--Shoup authentication. Yet other free sums of 1-way function...
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
implementation Leakage-resilient cryptography
2016/1/6
Leakage-resilient cryptography aims to extend the rigorous
guarantees achieved through the provable security paradigm to physical
implementations. The constructions and mechanisms designed on basis
...
Attribute-Based Versions of Schnorr and ElGamal
attribute-based cryptography Discrete Logarithm setting verifiable computation
2016/1/3
We design in this paper the first attribute-based cryptosystems that work in the classical Discrete
Logarithm, pairing-free, setting. The attribute-based signature scheme can be seen as an extension ...
On the Hardness of Proving CCA-security of Signed ElGamal
proofs of knowledge sigma protocols fiat-shamir
2015/12/29
The well-known Signed ElGamal scheme consists of ElGamal
encryption with a non-interactive Schnorr proof of knowledge. While this
scheme should be intuitively secure against chosen-ciphertext attack...
Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp
Secure outsourcing data privacy cloud computing
2015/12/22
This paper addresses the secure outsourcing problem for large-scale matrix computation to
a public cloud. We propose a novel public-key weave ElGamal encryption (WEE) scheme for encrypting
a matrix ...
基于ElGamal变体同态的安全两方计算协议设计
同态加密 ElGamal加密体制 私有点计算
2015/3/1
本文分析了ElGamal的同态特性,针对协议设计需要,设计了ElGamal变体加密方案,使其满足加法同态和常数乘法同态。在半诚实模型下,基于这个变体提出了过私有点直线方程同态计算协议,并分析了协议的正确性、安全性、计算和通信复杂性,同时将该协议的应用范围扩展到安全两方线段求交协议等。与解决同类几何问题的协议相比,未采用基于不经意传输和百万富翁协议设计思路,而是基于同态加密体制提出了一种安全两方计算...
On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption
Leakage Resilient Cryptography ElGamal Encryption Mathematical Realization
2013/4/18
Leakage resilient cryptography aims to address the issue of inadvertent and unexpected information leakages from physical cryptographic implementations. At Asiacrypt 2010, E.Kiltz et al. [1] presented...
Can one use the discrete logarithm problem in matrix groups, to build a better and secure cryptosystem? We argue, it is indeed the case. This makes the group of circulant matrices suitable and attract...
基于ELGamal数字签名的双向认证方案
数字签名 双向认证 零知识证明 离散对数
2010/3/22
针对当前认证方案中普遍存在的认证效率较低和认证过程较复杂等问题,提出一种基于ELGamal数字签名的双向认证方案,引入密钥分配中心作为第三方,承担公钥的分发并与认证双方进行通信。分析结果表明,该方案在离散对数问题的基础上提高了难度,在计算量方面优于其他双向认证方案,可广泛用于分布式环境下的身份识别和数字签名。
广义ELGamal型盲签名方案的强弱性分析
盲签名 强盲签名 弱盲签名
2009/7/22
分析了基于离散对数问题构造盲签名方案的一些文献中在对盲签名的强弱性分析方面存在的问题。通过证明任意一个合法的消息签名对,都能找到一组盲因子使之与某个盲消息签名对相联系,指出了以姚亦峰的二元仿射变换为构造思想,引入三元随机盲化参数得到的盲签名方案的强盲性证明中“基于离散对数难题”的这一论据是不成立的,重新给出了其强盲性的形式化证明;而使用二元随机盲化参数得到的盲签名方案为弱盲签名的论断是错误的,重新...
Privacy Preserving Multiset Union with ElGamal Encryption
Privacy Multiset Union ElGamal Encryption
2009/6/10
The privacy preserving multiset union (PPMU) protocol allows a set of parties,
each with a multiset, to collaboratively compute a multiset union secretly, meaning that any
information other than uni...
We establish the complete complexity landscape surrounding CCA1-security of Elgamal and Damg°ard’s
Elgamal (DEG). Denote by XY [i] the assumption that the adversary, given a non-adaptive oracle acces...
On The Security of The ElGamal Encryption Scheme and Damg°ard’s Variant
ElGamal encryption Damg°ard’s ElGamal variant security proof
2009/6/4
In this paper, we discuss the security of the ElGamal encryption scheme and its variant by
Damg°ard. For the ElGamal encryption, we show that (1) under the generalized knowledge-of-exponent
assumpti...