Loading...
conference paper
When Stream Cipher Analysis Meets Public-Key Cryptography
2007
Selected Areas in Cryptography. SAC 2006
Inspired by fast correlation attacks on stream ciphers, we present a stream cipher-like construction for a public-key cryptosystem whose security relies on two problems: finding a low-weight multiple of a given polynomial and a Hidden Correlation problem. We obtain a weakly secure public-key cryptosystem we call TCHo (as for Trapdoor Cipher, Hardware Oriented). Using the Fujisaki-Okamoto construction, we can build an hybrid cryptosystem, TCHon-FO, resistant against adaptive chosen ciphertext attacks.
Loading...
Name
FV06.pdf
Access type
openaccess
Size
290.27 KB
Format
Adobe PDF
Checksum (MD5)
d81ca59b58021648416abee54f2b55d3