A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

From MaRDI portal
Publication:2974477

DOI10.1007/3-540-39568-7_2zbMath1359.94590OpenAlexW1534388293WikidataQ52600627 ScholiaQ52600627MaRDI QIDQ2974477

Taher Elgamal

Publication date: 10 April 2017

Published in: Advances in Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-39568-7_2




Related Items

A New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesUnnamed ItemOutsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud IntegrationMaking Private Function Evaluation Safer, Faster, and SimplerCompressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold SignaturesOn the (im)possibility of secure ElGamal blind signaturesAn efficient identity tracing scheme for blockchain-based systemsPrivacy-preserving blueprintsAlgebraic restriction codes and their applicationsTracing a linear subspace: application to linearly-homomorphic group signaturesDeniable authentication when signing keys leakOn the security of functional encryption in the generic group modelElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyI want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groupsTowards practical topology-hiding computationAnamorphic signatures: secrecy from a dictator who only permits authentication!Generic constructions of master-key KDM secure attribute-based encryptionOn one-way ring homomorphismsAstrolabous: a universally composable time-lock encryption schemeKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness$$\mathsf {HIKE}$$ : Walking the Privacy TrailPublic-key encryption from homogeneous CLWETowards practical homomorphic time-lock puzzles: applicability and verifiabilityEndemic oblivious transfer via random oracles, revisitedNetwork-agnostic security comes (almost) for free in DKG and MPCCompact structure-preserving signatures with almost tight securityCut Down the Tree to Achieve Constant Complexity in Divisible E-cashComputation of a 768-Bit Prime Field Discrete LogarithmConcurrently Composable Security with Shielded Super-Polynomial SimulatorsLinearly Homomorphic Authenticated Encryption with Provable Correctness and Public VerifiabilityUnidirectional Chosen-Ciphertext Secure Proxy Re-encryptionEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesKoblitz Curves and Integer Equivalents of Frobenius ExpansionsExtended security arguments for signature schemesProvably Secure (Broadcast) Homomorphic SigncryptionEncoding of Rational Numbers and Their Homomorphic Computations for FHE-Based ApplicationsMinicrypt primitives with algebraic structure and applicationsThreshold-directed signature scheme based on hybrid number theoretic problemsChosen-Ciphertext Secure Proxy Re-encryption without PairingsCryptanalysis of MOR and Discrete Logarithms in Inner Automorphism GroupsType-Based Proxy Re-encryption and Its ConstructionA Tamper-Evident Voting Machine Resistant to Covert ChannelsDigital SignaturesReal Hidden Identity-Based SignaturesHow to Challenge and Cast Your e-VoteEnhanced Digital Signature Using RNS Digit Exponent RepresentationGeneric construction for tightly-secure signatures from discrete logMore efficient shuffle argument from unique factorizationA closer look at multiple forking: leveraging (in)dependence for a tighter boundAutomata evaluation and text search protocols with simulation-based securityRobust key authentication scheme resistant to public key substitution attacksTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelAnonymous Authentication with Optional Shared Anonymity Revocation and LinkabilityBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesThe Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?Attacking (EC)DSA Given Only an Implicit HintQuantum Homomorphic Encryption for Circuits of Low T-gate ComplexityGeneric plaintext equality and inequality proofsVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)Delegation with supervisionImproved zero-knowledge argument of encrypted extended permutationEfficient attribute-based proxy re-encryption with constant size ciphertextsSimpler constructions of asymmetric primitives from obfuscationCertificateless Proxy Re-Encryption Without PairingsCramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoringA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementReconciling non-malleability with homomorphic encryptionShort signatures from Diffie-Hellman: realizing almost compact public keyOn the Menezes-Teske-Weng conjectureA lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecturePrivacy and verifiability in voting systems: methods, developments and trendsBreaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended versionStructure-Preserving Smooth Projective HashingSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionLayouts for improved hierarchical parallel computationsA Static Diffie-Hellman Attack on Several Direct Anonymous Attestation SchemesA suite of algorithms for key distribution and authentication in centralized secure multicast environmentsMultikey Fully Homomorphic Encryption and ApplicationsHomomorphic extensions of CRT-based secret sharingCryptanalysis on Mu-Varadharajan's e-voting schemesLattice attacks against elliptic-curve signatures with blinded scalar multiplicationElliptic curve discrete logarithm problem over small degree extension fieldsSecurity analysis of the public key algorithm based on Chebyshev polynomials over the integer ring \(Z_{N}\)Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in CloudEfficient set operations in the presence of malicious adversariesModular Reduction in GF(2 n ) without Pre-computational PhaseEnvironmentally friendly composable multi-party computation in the plain model from standard (timed) assumptionsAn efficient quantum somewhat homomorphic symmetric searchable encryptionSurvey on hardware implementation of random number generators on FPGA: theory and experimental analysesOn the impossibility of purely algebraic signaturesNon-malleable encryption: simpler, shorter, strongerHomomorphic secret sharing for low degree polynomialsOn the impossibility of structure-preserving deterministic primitivesNew Realizations of Efficient and Secure Private Set Intersection Protocols Preserving FairnessAuthentic Quantum NoncesBreaking and Fixing Anonymous Credentials for the CloudInteger Reconstruction Public-Key EncryptionSigncryption Schemes Based on the Diffie–Hellman ProblemTightly secure ring signatures in the standard modelSliding encryption: A cryptographic tool for mobile agentsPublic-Key Encryption with Delegated SearchBenaloh’s Dense Probabilistic Encryption RevisitedAdaptively Secure Non-interactive Threshold CryptosystemsThreshold circuit lower bounds on cryptographic functionsPrivacy-preserving restricted Boltzmann machineSpeeding up exponentiation using an untrusted computational resourceSubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesDeterministic Encryption: Definitional Equivalences and Constructions without Random OraclesTracing Malicious Proxies in Proxy Re-encryptionFair Traceable Multi-Group SignaturesIndiscreet logarithms in finite fields of small characteristicGeneric Construction of UC-Secure Oblivious TransferPost-Quantum Cryptography: State of the ArtSecure ElGamal-Type Cryptosystems Without Message EncodingEfficient Secure Two-Party ExponentiationEncrypted data processing with homomorphic re-encryptionMinimizing the Number of Bootstrappings in Fully Homomorphic EncryptionVerifiable random functions: relations to identity-based key encapsulation and new constructionsRealizing Hash-and-Sign Signatures under Standard AssumptionsOptimal Randomness Extraction from a Diffie-Hellman ElementA New Randomness Extraction Paradigm for Hybrid EncryptionAccelerating Oblivious Transfer with Batch Multi-exponentiationBoosting verifiable computation on encrypted dataAnother Look at Extended Private Information Retrieval ProtocolsLegally Fair Contract Signing Without KeystonesOffline Witness EncryptionBETA: biometric-enabled threshold authenticationNetwork-Hiding Communication and Applications to Multi-party ProtocolsFilling the gap between voters and cryptography in e-votingEfficient Conditional Proxy Re-encryption with Chosen-Ciphertext SecurityQuasi-quadratic elliptic curve point counting using rigid cohomologyPublicly Verifiable Secret Sharing for Cloud-Based Key ManagementAuthenticated Byzantine Generals in Dual Failure ModelEfficiency Limitations for Σ-Protocols for Group HomomorphismsQuantum binary search algorithmCryptosystems based on semi-distributive algebrasEfficient big integer multiplication and squaring algorithms for cryptographic applicationsTime-and-ID-based proxy reencryption schemeOn succinct arguments and witness encryption from groupsBreaking the decisional Diffie-Hellman problem for class group actions using genus theoryComment on the ``Quantum public-key cryptosystemSynchronization of a novel fractional order stretch-twist-fold (STF) flow chaotic system and its application to a new authenticated encryption scheme (AES)Generic transformation from broadcast encryption to round-optimal deniable ring authenticationBlind polynomial evaluation and data trading