Abstract
The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world. However, many proposed formal approaches allow the use of composed keys, where any arbitrary expression can be used as encryption key. We consider an extension of the formal model presented by Abadi and Rogaway, in which it is allowed to use composed keys in formal encryption. We then provide a computational interpretation for expressions that allow us to establish the computational soundness of formal encryption with composed keys.
Original language | English |
---|---|
Title of host publication | Information Security and Cryptology - ICISC 2003 |
Subtitle of host publication | 6th International Conference, Seoul, Korea, November 27-28, 2003. Revised Papers |
Editors | Jong-In Lim, Dong-Hoo Lee |
Place of Publication | Berlin, Heidelberg |
Publisher | Springer |
Pages | 55-66 |
Number of pages | 12 |
ISBN (Electronic) | 978-3-540-24691-6 |
ISBN (Print) | 978-3-540-21376-5 |
DOIs | |
Publication status | Published - Nov 2003 |
Event | 6th Annual International Conference on Information Security and Cryptology, ICISC 2003 - Seoul, Korea, Republic of Duration: 1 Nov 2003 → 1 Nov 2003 Conference number: 6 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 2971 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 6th Annual International Conference on Information Security and Cryptology, ICISC 2003 |
---|---|
Abbreviated title | ICISC |
Country/Territory | Korea, Republic of |
City | Seoul |
Period | 1/11/03 → 1/11/03 |
Keywords
- SCS-Cybersecurity