Three's Compromised Too: Circular Insecurity for Any Cycle Length from Ring-LWE

Navid Alamati
Navid Alamati

Proceedings, Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9815, pp. 659-680, 2016.

Cited by: 0|Bibtex|Views17|Links
EI

Abstract:

A public-key encryption scheme is k-circular secure if a cycle of﾿k encrypted secret keys $\\mathsf {Enc} _{pk_{1}}sk_{2}, \\mathsf {Enc} _{pk_{2}}sk_{3}, \\ldots , \\mathsf {Enc} _{pk_{k}}sk_{1}$ is indistinguishable from encryptions of zeros. Circular security has applications in a wide variety of settings, ranging from security of ...More

Code:

Data:

Your rating :
0

 

Tags
Comments