%0 Journal Article
%T Abuses of Ajtai-Dwork Cryptosystem
Ajtai-Dwork密码系统的误用
%A ZHAO Zhu
%A
赵柱
%J 软件学报
%D 2000
%I
%X Ajtai and Dwork have introduced a probabilistic public-key encryption scheme which is secure under the assumption that a certain computational problem on lattices is hard on the worst-case. In this paper, the author demonstrates how Ajtai-Dwork cryptosystem can be abused. Using this kind of abuses, users can communicate secrets in a key escrowed Ajtai-Dwork cryptosystem without fearing that their secrets will be revealed later by reconstructing their escrowed private-keys. However, it is also shown that users have to trust their implementers because unscrupulous implementers of Ajtai-Dwork cryptosystem may leak their private-keys without their awareness. The author shows how one can make Ajtai-Dwork cryptosystem abuse-free.
%K Subliminal channel
%K abuse of cryptosystem
%K key escrow
阈下通道
%K 密码系统的误用
%K key-escrow.
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=7735F413D429542E610B3D6AC0D5EC59&aid=260FB60AB55A3BFF&yid=9806D0D4EAA9BED3&vid=708DD6B15D2464E8&iid=94C357A881DFC066&sid=E04FC1B5BC47587B&eid=4081E94A71AB3C30&journal_id=1000-9825&journal_name=软件学报&referenced_num=0&reference_num=7