Secret-key cryptography from ideal primitives: A systematic verview

Download
No fulltext has been uploaded. References only!

Conference Paper | Published | English

Scopus indexed
Author
Gazi, PeterISTA; Tessaro, Stefano
Department
Abstract
Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.
Publishing Year
Date Published
2015-06-24
Proceedings Title
2015 IEEE Information Theory Workshop
Publisher
IEEE
Article Number
7133163
Conference
ITW: Information Theory Workshop
Conference Location
Jerusalem, Israel
Conference Date
2015-04-26 – 2015-05-01
IST-REx-ID

Export

Marked Publications

Open Data ISTA Research Explorer

Search this title in

Google Scholar