How to deal with large tightness gaps in security proofs is a vexing issue in cryptography. Even when analyzing protocols that are of practical importance, leading researchers often fail to treat this question with the seriousness that it deserves. We discuss nontightness in connection with complexity leveraging, HMAC, lattice-based cryptography, identity-based encryption, and hybrid encryption.
CITATION STYLE
Chatterjee, S., Koblitz, N., Menezes, A., & Sarkar, P. (2017). Another look at tightness II: Practical issues in cryptography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10311 LNCS, pp. 21–55). Springer Verlag. https://doi.org/10.1007/978-3-319-61273-7_3
Mendeley helps you to discover research relevant for your work.