Computational soundness about formal encryption in the presence of secret shares and key cycles

Xinfeng Lei*, Rui Xue, Ting Yu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

The computational soundness of formal encryption is studied extensively following the work of Abadi and Rogaway[1]. Recent work considers the scenario in which secret sharing is needed, and separately, the scenario when key cycles are present. The novel technique is the use of a co-induction definition of the adversarial knowledge. In this paper, we prove a computational soundness theorem of formal encryption in the presence of both key cycles and secret shares at the same time, which is a non-trivial extension of former approaches.

Original languageEnglish
Title of host publicationInformation and Communications Security - 13th International Conference, ICICS 2011, Proceedings
Pages29-41
Number of pages13
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event13th International Conference on Information and Communications Security, ICICS 2011 - Beijing, China
Duration: 23 Nov 201126 Nov 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7043 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Conference on Information and Communications Security, ICICS 2011
Country/TerritoryChina
CityBeijing
Period23/11/1126/11/11

Fingerprint

Dive into the research topics of 'Computational soundness about formal encryption in the presence of secret shares and key cycles'. Together they form a unique fingerprint.

Cite this