Skip to main content
Article thumbnail
Location of Repository

Lecture 10

By Lecturer Jonathan, Jeffrey Blank, Chiu Yuen Koo and Nikolai Yakovenko


We had previously begun to analyze the Cramer-Shoup encryption scheme by looking at a simplified version of the scheme that is secure only against non-adaptive chosen-ciphertext attacks. These notes revisit this discussion, and then go on to show the full Cramer-Shoup scheme that is secure against adaptive chosen-ciphertext attacks [1]. 2 Simplified Cramer-Shoup Recall the simplified Cramer-Shoup scheme: • P K = (g1, g2, h = g x 1 gy 2, c = ga 1 gb 2) • SK = (x, y, a, b) • EP K(m): choose random r

Topics: q
Year: 2004
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.