How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts.
Thibaut HorelSunoo ParkSilas RichelsonVinod VaikuntanathanPublished in: ITCS (2019)
Keyphrases
- ciphertext
- encryption scheme
- private key
- encryption algorithm
- standard model
- secret key
- stream cipher
- public key
- diffie hellman
- security analysis
- security level
- encryption decryption
- encryption algorithms
- advanced encryption standard
- security model
- data encryption
- encrypted data
- key management
- data sharing
- secret sharing scheme
- information security
- high security
- public key cryptography
- identity authentication
- smart card
- elliptic curve cryptography
- mutual authentication
- fault model
- secure communication
- security properties
- s box
- provably secure
- image encryption