Skip to main content
Article thumbnail
Location of Repository

Lecture 10

By Lecturer Jonathan, Jeffrey Blank, Chiu Yuen Koo and Nikolai Yakovenko

Abstract

We had previously begun to analyze the Cramer-Shoup encryption scheme by looking at a simplified version of the scheme that is secure only against non-adaptive chosen-ciphertext attacks. These notes revisit this discussion, and then go on to show the full Cramer-Shoup scheme that is secure against adaptive chosen-ciphertext attacks [1]. 2 Simplified Cramer-Shoup Recall the simplified Cramer-Shoup scheme: • P K = (g1, g2, h = g x 1 gy 2, c = ga 1 gb 2) • SK = (x, y, a, b) • EP K(m): choose random r

Topics: q
Year: 2004
OAI identifier: oai:CiteSeerX.psu:10.1.1.134.1027
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.cs.umd.edu/~jkatz/g... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.