참고문헌
- Emmanuel Bresson, Dario Catalano, and David Pointcheval, 'A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications', ASIACRYPT 2003, LNCS 2894, pp. 37-54, Springer-Verlag, 2003
- Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway, 'Relations Among Notions of Security for Public-Key Encryption Schemes', CRYPTO'98, LNCS 1462, pp. 26-46, Springer-Verlag, 1998
- Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, 'Provably Secure Length-Saving Public-Key Encryption Scheme under the Computational Diffie-Hellman Assumption', ETRI Journal, Volume 22, Number 4, December 2000
- Ronald Cramer, and Victor Shoup, 'Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption', EUROCRYPT 2002, LNCS 2332, pp. 45-64, Springer-Verlag, 2002
- D. Dolev, C. Dwork, and M. Naor, 'Non-malleable cryptography', Proceedings of the 23rd Annual Symposium on Theory of Computing, ACM, 1991
- W. Diffie, and M. E. Hellman, 'New Directions in Cryptography', IEEE Transactions on Informaion Theory, 22(6), 644-654, 1976 https://doi.org/10.1109/TIT.1976.1055638
- Eiichiro Fujisaki, and Tatsuaki Okamoto, 'How to Enhance the Security of Public-Key Encryption at Minimum Cost', PKC'99, LNCS 1560, pp. 53-68, 1999
- S. Goldwasser, and S. Micali, 'Probabilistic encryption', Journal of Computer and System Science, Vol.28, No.2, pp.270-299, 1984 https://doi.org/10.1016/0022-0000(84)90070-9
- Eike Kiltz and John Malone-Lee, 'A General Construction of IND-CCA2 Secure Public Key Encryption', Cry ptography and Coding 2003, LNCS 2898, pp. 152-166, 2003
-
Wenbo Mao, and Chae Hoon Lim, 'Cryptanalysis in Prime Order Subgroups of
$Z^*_n$ ', ASIACRYPT'98, LNCS 1514, pp. 214-226, 1998 - A.J. Menezes, P.C. Oorschot, and S.A. Vanstone, 'Handbook of Applied Cryptography', CRC Press, Inc, (1999)
- Tatsuaki Okamoto, Shigenori Uchiyama, 'A New Public-Key Cryptosystem as Secure as Factoring', EUROCRYPT'98, LNCS 1403, pp. 308-318, Springer-Verlag, 1998
- Pascal Paillier, 'Public-Key Cryptosystems Based on Composite Degree Residuosity Classes', EUROCRYPT'99, LNCS 1592, pp. 223-238, Springer-Verlag, 1999
- Rene Peralta, 'Report on Integer Factorization', available at http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1025_report.pdf, 2001
- David Pointcheval, 'Chosen-Ciphertext Security for any One-Way Cryptosystem', Proceedings of PKC'2000, LNCS 1751, pp. 129-146, 2000