A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy
[chapter]
2017
Lecture Notes in Computer Science
We study the security of symmetric encryption schemes in settings with multiple users and realistic adversaries who can adaptively corrupt encryption keys. To avoid confinement to any particular definitional paradigm, we propose a general framework for multi-key security definitions. By appropriate settings of the parameters of the framework, we obtain multi-key variants of many of the existing single-key security notions. This framework is instrumental in establishing our main results. We show
doi:10.1007/978-3-319-70500-2_14
fatcat:afehqm23tzhqff3bfqemgifzoy