Sound computational interpretation of formal encryption with composed keys

21Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world. However, many proposed formal approaches allow the use of composed keys, where any arbitrary expression can be used as encryption key. In this paper we consider an extension of the formal model presented by Abadi and Rogaway, in which it is allowed to use composed keys in formal encryption. We then provide a computational interpretation for expressions that allow us to establish the computational soundness of formal encryption with composed keys. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Laud, P., & Corin, R. (2004). Sound computational interpretation of formal encryption with composed keys. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2971, 55–66. https://doi.org/10.1007/978-3-540-24691-6_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free