Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks

Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks

ISBN13: 9781522529156|ISBN10: 1522529152|EISBN13: 9781522529163
DOI: 10.4018/978-1-5225-2915-6.ch011
Cite Chapter Cite Chapter

MLA

Balasubramanian, Kannan. "Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks." Algorithmic Strategies for Solving Complex Problems in Cryptography, edited by Kannan Balasubramanian and M. Rajakani, IGI Global, 2018, pp. 134-144. https://doi.org/10.4018/978-1-5225-2915-6.ch011

APA

Balasubramanian, K. (2018). Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks. In K. Balasubramanian & M. Rajakani (Eds.), Algorithmic Strategies for Solving Complex Problems in Cryptography (pp. 134-144). IGI Global. https://doi.org/10.4018/978-1-5225-2915-6.ch011

Chicago

Balasubramanian, Kannan. "Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks." In Algorithmic Strategies for Solving Complex Problems in Cryptography, edited by Kannan Balasubramanian and M. Rajakani, 134-144. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-2915-6.ch011

Export Reference

Mendeley
Favorite

Abstract

To deal with active attacks in public key encryptions, the notion of security against an adaptive chosen ciphertext attack has been defined by Researchers. If an adversary can inject messages into a network, these messages may be ciphertexts, and the adversary may be able to extract partial information about the corresponding cleartexts through its interaction with parties in the network. The Security against chosen ciphertext attack is defined using an “decryption oracle.” Given an encryption of a message the “ciphertext” we want to guarantee that the adversary cannot obtain any partial information about the message. A method of securing Public Key Cryptosystems using hash functions is described in this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.