Abuses of Ajtai-Dwork Cryptosystem
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Ajtai and Dwork have introduced a probabilistic public-key encryption scheme which is secure under the assumption that a certain computational problem on lattices is hard on the worst-case. In this paper, the author demonstrates how Ajtai-Dwork cryptosystem can be abused. Using this kind of abuses, users can communicate secrets in a key escrowed Ajtai-Dwork cryptosystem without fearing that their secrets will be revealed later by reconstructing their escrowed private-keys. However, it is also shown that users have to trust their implementers because unscrupulous implementers of Ajtai-Dwork cryptosystem may leak their private-keys without their awareness. The author shows how one can make Ajtai-Dwork cryptosystem abuse-free.

    Reference
    Related
    Cited by
Get Citation

赵柱. Ajtai-Dwork密码系统的误用.软件学报,2000,11(5):584-589

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:December 12,1997
  • Revised:March 30,1998
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063