<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf23403</article-id><article-id pub-id-type="doi">10.15388/Informatica.2012.374</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Chang</surname><given-names>Ting-Yi</given-names></name><email xlink:href="mailto:tychang@cc.ncue.edu.tw">tychang@cc.ncue.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Hwang</surname><given-names>Min-Shiang</given-names></name><email xlink:href="mailto:mshwang@mail.cyut.edu.tw">mshwang@mail.cyut.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/><xref ref-type="corresp" rid="fn1">∗</xref></contrib><contrib contrib-type="Author"><name><surname>Yang</surname><given-names>Wei-Pang</given-names></name><email xlink:href="mailto:wpyang@mail.ndhu.edu.tw">wpyang@mail.ndhu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Industrial Education and Technology, National Changhua University of Education, No. 1, Jin-De Road, Changhua City, Taiwan, R.O.C.</aff><aff id="j_INFORMATICA_aff_001">Department of Computer Science &amp; Information Engineering, Asia University, 1500, Lioufeng Rd., Wufeng, Taichung, Taiwan, R.O.C.</aff><aff id="j_INFORMATICA_aff_002">Department of Information Management, National Dong Hwa University, 1, Sec. 2, Da Hsueh Rd., Shou-Feng, Hualien, Taiwan, R.O.C.</aff></contrib-group><author-notes><corresp id="fn1"><label>∗</label>Corresponding author.</corresp></author-notes><pub-date pub-type="epub"><day>01</day><month>01</month><year>2012</year></pub-date><volume>23</volume><issue>4</issue><fpage>537</fpage><lpage>562</lpage><history><date date-type="received"><day>01</day><month>08</month><year>2010</year></date><date date-type="accepted"><day>01</day><month>09</month><year>2012</year></date></history><abstract><p>Hwang et al. proposed an ElGamal-like scheme for encrypting large messages, which is more efficient than its predecessor in terms of computational complexity and the amount of data transformation. They declared that the resulting scheme is semantically secure against chosen-plaintext attacks under the assumptions that the decision Diffie–Hellman problem is intractable. Later, Wang et al. pointed out that the security level of Hwang et al.'s ElGamal-like scheme is not equivalent to the original ElGamal scheme and brings about the disadvantage of possible unsuccessful decryption. At the same time, they proposed an improvement on Hwang et al.'s ElGamal-like scheme to repair the weakness and reduce the probability of unsuccessful decryption. However, in this paper, we show that their improved scheme is still insecure against chosen-plaintext attacks whether the system is operated in the quadratic residue modulus or not. Furthermore, we propose a new ElGamal-like scheme to withstand the adaptive chosen-ciphertext attacks. The security of the proposed scheme is based solely on the decision Diffie–Hellman problem in the random oracle model.</p></abstract><kwd-group><label>Keywords</label><kwd>public-key encryption</kwd><kwd>cryptanalysis</kwd><kwd>chosen-plaintext attack</kwd><kwd>adaptive chosen-chipher-text attack</kwd><kwd>chosen-ciphertext attack</kwd><kwd>Diffie–Hellman problem</kwd><kwd>indistinguishable</kwd></kwd-group></article-meta></front></article>