Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption

Author(s):  
Takahiro Matsuda ◽  
Goichiro Hanaoka
Author(s):  
Keith M. Martin

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.


2012 ◽  
Vol 9 (3) ◽  
pp. 189-200 ◽  
Author(s):  
Kitak Kim ◽  
Jong Hwan Park ◽  
Dong Hoon Lee

Informatica ◽  
2012 ◽  
Vol 23 (4) ◽  
pp. 537-562 ◽  
Author(s):  
Ting-Yi Chang ◽  
Min-Shiang Hwang ◽  
Wei-Pang Yang

Author(s):  
Ai ISHIDA ◽  
Keita EMURA ◽  
Goichiro HANAOKA ◽  
Yusuke SAKAI ◽  
Keisuke TANAKA

2009 ◽  
Vol 20 (10) ◽  
pp. 2907-2914 ◽  
Author(s):  
Liao-Jun PANG ◽  
Hui-Xian LI ◽  
Li-Cheng JIAO ◽  
Yu-Min WANG

2019 ◽  
Vol 19 (1) ◽  
pp. 15-38
Author(s):  
Hiroaki Anada ◽  
Akira Kanaoka ◽  
Natsume Matsuzaki ◽  
Yohei Watanabe

Author(s):  
Ziba Eslami ◽  
Mahnaz Noroozi ◽  
Kobra Amirizirtol

Sign in / Sign up

Export Citation Format

Share Document