2010
DOI: 10.1007/978-3-642-13190-5_21
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Agility and Its Relation to Circular Encryption

Abstract: Abstract. We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, individually secure schemes can securely share the same key. We provide a surprising connection between two seemingly unrelated but challenging questions. The first, new to this paper, is whether wPRFs (weak-PRFs) are agile. The second, already posed several times in the literature, is whether every secure (IND-R) encryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(47 citation statements)
references
References 30 publications
(45 reference statements)
0
47
0
Order By: Relevance
“…Thus we present a less detailed proof than that of Lemma (4). The proof of all parts of the lemma are entirely similar, so we give the proof for part (1).…”
Section: C7 Proof Of Lemmamentioning
confidence: 99%
See 2 more Smart Citations
“…Thus we present a less detailed proof than that of Lemma (4). The proof of all parts of the lemma are entirely similar, so we give the proof for part (1).…”
Section: C7 Proof Of Lemmamentioning
confidence: 99%
“…Standard notions of secure encryption [32,48] ensure privacy of plaintexts chosen independently from the underlying secret key(s). It has long been known that a key encrypted under itself may no longer remain secret, and recent results [24,4] show that indeed for all k ≥ 1, k-circular security is not implied by standard security. Moreover, currently known techniques for standard security fall short when trying to prove non-trivial security statements against more adaptive adversaries.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The notion of agility [6] considers a set of schemes, all meeting some base notion of security, and requires that security is maintained when multiple schemes use the same key. Agility is thus not a property of an individual scheme but of a set of schemes relative to some (standard) security notion.…”
Section: Security Analysismentioning
confidence: 99%
“…However, the function subset {f1, f2, f3, f4, f5}, whilst distinct, all take the same key as input. Thus our requirement is that this set is "PRF Agile", where we use agile in the sense of Acar et al [6].…”
Section: Introductionmentioning
confidence: 99%