A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
[chapter]
2015
Lecture Notes in Computer Science
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomness sources deployed in practical implementations of these protocols often fall short in meeting this assumption, but instead provide only a steady stream of bits with certain high entropy. Trying to ground cryptographic protocols on such imperfect, weaker sources of randomness has thus far mostly given rise to a
doi:10.1007/978-3-319-28166-7_33
fatcat:ahpzefndhngv7ikuf3yle572dq