Abstract
In this paper, we prove that a slightly modified version of Zheng and Seberry’s public key encryption scheme presented at Crypto ’92 is secure against adaptive chosen ciphertext attacks in the random oracle model, assuming the Gap Diffie–Hellman problem is intractable. A further contribution of this paper is to show that Soldera, Seberry, and Qu’s recent security analysis of Zheng and Seberry’s scheme is in fact flawed.
Similar content being viewed by others
References
Abdala M, Bellare M, Rogaway P (2001) The oracle Diffie–Hellman assumptions and an analysis of DHIES. In: Naccache D (ed) Progress in cryptology – CT-RSA 2001, San Francisco. Lecture notes in computer science, vol 2020, Springer, Berlin Heidelberg New York, pp 143–158
Bellare M, Desai A, Pointcheval D, Rogaway P (1998) Relations among notions of security for public-key encryption schemes. In: Krawczyk H (ed) Advances in cryptology – Crypto ’98, Santa Barbara. Lecture notes in computer science, vol 1462, Springer, Berlin Heidelberg New York, pp 26–45
Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, Fairfax, VA, November 1993. ACM Press, New York, pp 62–73
FIPS Publication 180-1 (1995) Secure hash standard
IEEE P1363 (2000) Standard specifications for public key cryptography
Lim C, Lee P (1993) Another method for attaining security against adaptively chosen ciphertext attack. In: Stinson D (ed) Advances in cryptology – Crypto ’93, Santa Barbara, CA. Lecture notes in computer science, vol 773, Springer, Berlin Heidelberg New York, pp 410–434
Okamoto T, Pointcheval D (2001) The Gap-problems: a new class of problems for the security of cryptographic schemes. In: Kim K (ed) Public key cryptography – PKC 2001, Cheju Island, South Korea. Lecture notes in computer science, vol 1992, Springer, Berlin Heidelberg New York, pp 104–118
Okamoto T, Pointcheval D (2001) REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Naccache D (ed) Progress in cryptology – CT-RSA 2001, San Francisco. Lecture notes in computer science, vol 2020, Springer, Berlin Heidelberg New York, pp 159–174
Shoup V (2001) OAEP reconsidered. In: Kilian J (ed) Advances in cryptology – Crypto 2001, Santa Barbara, CA. Lecture notes in computer science, vol 2139, Springer, Berlin Heidelberg New York, pp 239–259
Soldera D, Seberry J, Qu C (2002) The analysis of Zheng–Seberry scheme. In: Batten L, Seberry J (eds) Proceedings of the Australasian conference on information security and privacy – ACISP 2002, Melbourne, Australia, July 2002. Lecture notes in computer science, vol 2384, Springer, Berlin Heidelberg New York, pp 159–168
Zheng Y (1994) Improved public key cryptosystems secure against chosen ciphertext attacks. Technical Note, The Centre for Computer Security Research, University of Wollongong, Sydney, Australia
Zheng Y, Seberry J (1992) Practical approaches to attaining security against adaptively chosen ciphertext attacks. In: Brickell E (ed) Advances in cryptology – Crypto ’92, Santa Barbara, CA. Lecture notes in computer science, vol 742, Springer, Berlin Heidelberg New York, pp 292–304
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Baek, J., Zheng, Y. Zheng and Seberry’s public key encryption scheme revisited. IJIS 2, 37–44 (2003). https://doi.org/10.1007/s10207-003-0023-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-003-0023-7