Conditionally-perfect secrecy and a provably-secure randomized cipher

From MaRDI portal
Publication:1184508

DOI10.1007/BF00191321zbMath0746.94013WikidataQ122876894 ScholiaQ122876894MaRDI QIDQ1184508

Ueli M. Maurer

Publication date: 28 June 1992

Published in: Journal of Cryptology (Search for Journal in Brave)




Related Items (32)

Separating adaptive streaming from oblivious streaming using the bounded storage modelMagnifying computing gaps. Establishing encrypted communication over unidirectional channelsInformation-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratioOne-Time Programs with Limited MemoryOn the (im)possibility of non-interactive correlation distillationSecure multiparty computation in the bounded storage modelRandom oracles and non-uniformityOn the Impossibility of Strong Encryption Over $\aleph_0$Incompressible cryptographyAuthentication in the bounded storage modelLeakage Resilience of the Blom’s Key Distribution SchemeInfeasibility of instance compression and succinct PCPs for NPPuncturable signature: a generic construction and instantiationsRate-1 incompressible encryption from standard assumptionsSpeak much, remember little: cryptography in the bounded storage model, revisitedA storage complexity based analogue of Maurer key establishment using public channelsDisappearing cryptography in the bounded storage modelUnnamed ItemLong term confidentiality: a surveyInnovative approaches for security of small artefactsAn operational characterization of mutual information in algorithmic information theoryChameleon — A new kind of stream cipherEverlasting multi-party computationA Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage SchemesBasing Weak Public-Key Cryptography on Strong One-Way FunctionsFine-grained cryptography revisitedNon-interactive timestamping in the bounded-storage modelFine-Grained CryptographyCertified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion ResilienceBit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal ConstructionBig-Key Symmetric Encryption: Resisting Key ExfiltrationAn Everlasting Secure Non-interactive Timestamping Scheme in the Bounded Storage Model



Cites Work


This page was built for publication: Conditionally-perfect secrecy and a provably-secure randomized cipher