Secret-key cryptography from ideal primitives: A systematic verview
Download
No fulltext has been uploaded. References only!
Conference Paper
| Published
| English
Scopus indexed
Author
Gazi, PeterISTA;
Tessaro, Stefano
Department
Abstract
Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.
Publishing Year
Date Published
2015-06-24
Proceedings Title
2015 IEEE Information Theory Workshop
Publisher
IEEE
Article Number
7133163
Conference
ITW: Information Theory Workshop
Conference Location
Jerusalem, Israel
Conference Date
2015-04-26 – 2015-05-01
IST-REx-ID