Publication: A new cramer-shoup like methodology for group based provably secure encryption schemes
dc.affiliation.dpto | UC3M. Departamento de Matemáticas | es |
dc.contributor.author | González Vasco, María Isabel | |
dc.contributor.author | Martínez, Consuelo | |
dc.contributor.author | Steinwandt, Rainer | |
dc.contributor.author | Villar, Jorge L. | |
dc.date.accessioned | 2023-06-02T10:21:12Z | |
dc.date.available | 2023-06-02T10:21:12Z | |
dc.date.issued | 2005 | |
dc.description | Proceedings of: TCC 2005: Theory of Cryptography Conference, 10-12 February 2005, Cambridge, MA, USA. | en |
dc.description.abstract | A theoretical framework for the design of - in the sense of IND-CCA - provably secure public key cryptosystems taking non-abelian groups as a base is given. Our construction is inspired by Cramer and Shoup's general framework for developing secure encryption schemes from certain language membership problems; thus all our proofs are in the standard model, without any idealization assumptions. The skeleton we present is conceived as a guiding tool towards the construction of secure concrete schemes from finite non-abelian groups (although it is possible to use it also in conjunction with finite abelian groups). | en |
dc.format.extent | 15 | |
dc.identifier.bibliographicCitation | González Vasco, M. I., Martínez, C., Steinwandt, R. & Villar, J. L. (10-12 February 2005). A new cramer-shoup like methodology for group based provably secure encryption schemes [proceedings]. In Theory of Cryptography: Second Theory of Cryptography. Conference, TCC 2005. Cambridge, MA, USA. Part of the Lecture Notes in Computer Science book series (LNSC,volume 3378). | en |
dc.identifier.doi | https://doi.org/10.1007/978-3-540-30576-7_27 | |
dc.identifier.isbn | 978-3-540-24573-5 | |
dc.identifier.publicationfirstpage | 495 | |
dc.identifier.publicationlastpage | 509 | |
dc.identifier.publicationtitle | Theory of Cryptography: Second Theory of Cryptography. Conference, TCC 2005. Cambridge, MA, USA, February 10-12, 2005. Proceedings | en |
dc.identifier.publicationvolume | 3378 | |
dc.identifier.uri | https://hdl.handle.net/10016/37415 | |
dc.identifier.uxxi | CC/0000034120 | |
dc.language.iso | eng | |
dc.publisher | Springer | en |
dc.relation.eventdate | 2005-02-10 | |
dc.relation.eventplace | Estados Unidos de America | es |
dc.relation.eventtitle | TCC 2005: Theory of Cryptography Conference | en |
dc.relation.ispartofseries | Lecture Notes in Computer Science (Book Series) | en |
dc.rights | © 2005 Springer-Verlag Berlin Heidelberg | en |
dc.rights.accessRights | open access | en |
dc.subject.eciencia | Informática | es |
dc.subject.eciencia | Matemáticas | es |
dc.subject.eciencia | Telecomunicaciones | es |
dc.subject.other | Automorphism group | en |
dc.subject.other | Encryption scheme | en |
dc.subject.other | Braid group | en |
dc.subject.other | Cryptographic primitive | en |
dc.subject.other | Hash family | en |
dc.title | A new cramer-shoup like methodology for group based provably secure encryption schemes | en |
dc.type | conference proceedings | * |
dc.type.hasVersion | AM | * |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1