We reconcile these three works by providing a reference model of security for authenticated encryption in the face of decryption leakage from invalid queries. Having tracked the development of AE security games, we provide a single expressive framework allowing us to compare and contrast the previous notions. We find that at their core, the notions are essentially equivalent, with their key differences stemming from definitional choices independent of the desire to capture real world behaviour.
Category / Keywords: secret-key cryptography / provable security, authenticated encryption, multiple errors, unverified plaintext, robustness Original Publication (in the same form): IMA International Conference on Cryptography and Coding 2015 Date: received 14 Sep 2015 Contact author: martijn stam at bristol ac uk, daniel page@bristol ac uk, guy barwell@bristol ac uk Available format(s): PDF | BibTeX Citation Version: 20150915:070210 (All versions of this report) Short URL: ia.cr/2015/895 Discussion forum: Show discussion | Start new discussion