How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts
© Thibaut Horel, Sunoo Park, Silas Richelson, and Vinod Vaikuntanathan. In this work, we examine the feasibility of secure and undetectable point-to-point communication when an adversary (e.g., a government) can read all encrypted communications of surveillance targets. We consider a model where the...
Format: | Article |
---|---|
Language: | English |
Published: |
2021
|
Online Access: | https://hdl.handle.net/1721.1/137343 |
Similar Items
-
How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts
by: Horel, Thibaut, et al.
Published: (2022) -
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000) -
Security of COFB against chosen ciphertext attacks
by: Khairallah, Mustafa
Published: (2022) -
Development of a framework to encrypt plaintext to ciphertext
by: Zheng, Dongmiao
Published: (2021) -
Memory encryption-decryption in embedded systems
by: Tan, Xuan Yi
Published: (2019)