How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts.
Thibaut HorelSunoo ParkSilas RichelsonVinod VaikuntanathanPublished in: CoRR (2018)
Keyphrases
- ciphertext
- encryption scheme
- private key
- standard model
- encryption algorithm
- stream cipher
- secret key
- diffie hellman
- security analysis
- encryption decryption
- public key
- security level
- high security
- advanced encryption standard
- encryption algorithms
- security requirements
- secret sharing scheme
- key management
- information security
- elliptic curve cryptography
- security properties
- key exchange
- image encryption
- smart card
- s box
- data sharing
- identity authentication
- encrypted data
- secure communication
- mutual authentication
- integrity verification