How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts.
Thibaut HorelSunoo ParkSilas RichelsonVinod VaikuntanathanPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- ciphertext
- encryption scheme
- private key
- encryption algorithm
- secret key
- standard model
- stream cipher
- security analysis
- diffie hellman
- public key
- encryption algorithms
- key management
- security level
- secret sharing scheme
- data sharing
- encryption decryption
- secure communication
- identity authentication
- information security
- advanced encryption standard
- security properties
- high security
- fault model
- smart card
- authentication scheme
- image encryption
- security model
- access control
- key exchange
- encrypted data
- digital rights management
- authentication protocol
- data encryption
- lossless compression
- provably secure
- key distribution
- network security
- integrity verification