Symmetric Public-Key Encryption

18Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Public-key encryption would seem to be inherently assymmetric, in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of public keys; we give cryptographic protocols for the following tasks:1.Probabilistic encryption, using the same public key, both of messages that are sent to a particular user as well as of messages that the user sends to others, without compromising the key. We propose a public-key cryptosystem based on these protocols which has only one key, owned by a cryptographic server.2.Authentication both of the sender and of the receiver of a probabilistically encrypted message.3.Probabilistic encryption which is provably secure against both chosen-message and chosen-ciphertext attack.

Cite

CITATION STYLE

APA

Galil, Z., Haber, S., & Yung, M. (1986). Symmetric Public-Key Encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 218 LNCS, pp. 128–137). Springer Verlag. https://doi.org/10.1007/3-540-39799-X_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free