Publication | Closed Access
On cryptography with auxiliary input
229
Citations
17
References
2009
Year
Unknown Venue
Cryptographic PrimitiveEngineeringInformation SecurityInformation LeakageCryptographic TechnologySecret Key SkFormal VerificationHardware SecurityInformation Theoretic SecurityCryptanalysisData PrivacyComputer ScienceAuxiliary InputData SecurityCryptographyCryptographic SchemesEntropyCryptographic ProtectionArbitrary Function F
We study the question of designing cryptographic schemes which are secure even if an arbitrary function f(sk) of the secret key is leaked, as long as the secret key sk is still (exponentially) hard to compute from this auxiliary input. This setting of auxiliary input is more general than the more traditional setting, which assumes that some of information about the secret key sk may be leaked, but sk still has high min-entropy left. In particular, we deal with situations where f(sk) information-theoretically determines the entire secret key sk.
| Year | Citations | |
|---|---|---|
Page 1
Page 1