Using SMT Solvers to Automate Chosen Ciphertext Attacks.
Gabrielle BeckMaximilian ZinkusMatthew GreenPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- chosen ciphertext
- standard model
- encryption scheme
- forward secure
- modulo theories
- ciphertext
- signcryption scheme
- public key
- security analysis
- data sharing
- signature scheme
- secret sharing scheme
- diffie hellman
- lossless compression
- secret key
- satisfiability modulo theories
- hash functions
- cryptographic protocols
- blind signature scheme
- sat solvers
- image quality