On cryptography with auxiliary input

    STOC, pp. 621-630, 2009.

    Cited by: 206|Bibtex|Views5|Links
    EI
    Keywords:
    exponentially hard-to-invert auxiliary inputauxiliary inputcca secure symmetric encryptionsecret key skcryptographic schemeMore(8+)

    Abstract:

    We study the question of designing cryptographic schemes which are secure even if an arbitrary function f(sk) of the secret key is leaked, as long as the secret key sk is still (exponentially) hard to compute from this auxiliary input. This setting of auxiliary input is more general than the more traditional setting, which assumes that so...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments