On cryptography with auxiliary input
STOC, pp. 621-630, 2009.
exponentially hard-to-invert auxiliary inputauxiliary inputcca secure symmetric encryptionsecret key skcryptographic schemeMore(8+)
We study the question of designing cryptographic schemes which are secure even if an arbitrary function f(sk) of the secret key is leaked, as long as the secret key sk is still (exponentially) hard to compute from this auxiliary input. This setting of auxiliary input is more general than the more traditional setting, which assumes that so...More
Full Text (Upload PDF)