A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Does Encryption with Redundancy Provide Authenticity?
[chapter]
2001
Lecture Notes in Computer Science
A popular paradigm for achieving privacy plus authenticity is to append some "redundancy" to the data before encrypting. The redundancy is computed by applying a redundancy function to the data. We investigate the security of this paradigm at both a general and a specific level. We consider various possible notions of privacy for the base encryption scheme, and for each such notion we provide a condition on the redundancy function that is necessary and sufficient to ensure authenticity of the
doi:10.1007/3-540-44987-6_31
fatcat:nsdxoiynybe3pawyyuvw3dxha4