Public-key encryption in a multi-user setting: Security proofs and improvements

354Citations
Citations of this article
97Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper addresses the security of public-key cryptosystems in a “multi-user” setting, namely in the presence of attacks involving the encryption of related messages under different public keys, as exemplified by Håstad’s classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sense of “indistinguishability,” thereby pin-pointing many schemes guaranteed to be secure against Håstad-type attacks. We then highlight the importance, in practice, of considering and improving the concrete security of the general reduction, and present such improvements for two Diffie-Hellman based schemes, namely El Gamal and Cramer-Shoup.

References Powered by Scopus

A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

5218Citations
N/AReaders
Get full text

Probabilistic encryption

2598Citations
N/AReaders
Get full text

A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

1031Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Identity-based encryption from the weil pairing

6092Citations
N/AReaders
Get full text

Identity-based encryption from the weil pairing

1932Citations
N/AReaders
Get full text

Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack

705Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Bellare, M., Boldyreva, A., & Micali, S. (2000). Public-key encryption in a multi-user setting: Security proofs and improvements. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1807, pp. 259–274). Springer Verlag. https://doi.org/10.1007/3-540-45539-6_18

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 57

75%

Researcher 9

12%

Professor / Associate Prof. 6

8%

Lecturer / Post doc 4

5%

Readers' Discipline

Tooltip

Computer Science 62

83%

Mathematics 9

12%

Social Sciences 2

3%

Engineering 2

3%

Save time finding and organizing research with Mendeley

Sign up for free