Login / Signup
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts.
Thibaut Horel
Sunoo Park
Silas Richelson
Vinod Vaikuntanathan
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
ciphertext
encryption scheme
private key
encryption algorithm
secret key
standard model
stream cipher
security analysis
diffie hellman
public key
encryption algorithms
key management
security level
secret sharing scheme
data sharing
encryption decryption
secure communication
identity authentication
information security
advanced encryption standard
security properties
high security
fault model
smart card
authentication scheme
image encryption
security model
access control
key exchange
encrypted data
digital rights management
authentication protocol
data encryption
lossless compression
provably secure
key distribution
network security
integrity verification