%0 Journal Article %T Abuses of Ajtai-Dwork Cryptosystem
Ajtai-Dwork密码系统的误用 %A ZHAO Zhu %A
赵柱 %J 软件学报 %D 2000 %I %X Ajtai and Dwork have introduced a probabilistic public-key encryption scheme which is secure under the assumption that a certain computational problem on lattices is hard on the worst-case. In this paper, the author demonstrates how Ajtai-Dwork cryptosystem can be abused. Using this kind of abuses, users can communicate secrets in a key escrowed Ajtai-Dwork cryptosystem without fearing that their secrets will be revealed later by reconstructing their escrowed private-keys. However, it is also shown that users have to trust their implementers because unscrupulous implementers of Ajtai-Dwork cryptosystem may leak their private-keys without their awareness. The author shows how one can make Ajtai-Dwork cryptosystem abuse-free. %K Subliminal channel %K abuse of cryptosystem %K key escrow
阈下通道 %K 密码系统的误用 %K key-escrow. %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=7735F413D429542E610B3D6AC0D5EC59&aid=260FB60AB55A3BFF&yid=9806D0D4EAA9BED3&vid=708DD6B15D2464E8&iid=94C357A881DFC066&sid=E04FC1B5BC47587B&eid=4081E94A71AB3C30&journal_id=1000-9825&journal_name=软件学报&referenced_num=0&reference_num=7