26 August 1998
From: "Rich Ankney" <rankney@erols.com> To: <jy@jya.com> Subject: The CS PK Cryptosystem Date: Wed, 26 Aug 1998 20:08:12 -0400 This paper was posted to Victor's website a few months ago. This is a really great algorithm since it is provably secure (with no messy assumptions). OTOH it's a totally new algorithm (although obviously related to ElGamal). My question is: Why use this instead of RSA w/ "Optimal Asymmetric Encryption Padding" (OAEP) as used by SET, being standardized by ANSI X9 (as X9.44) etc.? The difference is that OAEP is secure only under the random oracle model (simple definition: H(x) looks random for most x). Regards, Rich PS: I swear I have no idea what Jon Graff would think about this:-)
JYA add: Rich Ankney is a member of the ANSI X9F Data & Information Security Subcommittee. Jon Graff is a member of PGP. From Crypto98: Lecture: "A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack" Ronald Cramer (ETH Zurich, Switzerland), Victor Shoup (IBM Zurich Research Laboratory, Switzerland) http://www.cs.wisc.edu/~shoup/papers/cs.ps.Z Or, http://www.zurich.ibm.com/Technology/Security/publications/1998/CS.pdf