%PDF-1.5 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (Notation and Preliminaries) endobj 9 0 obj << /S /GoTo /D (section.3) >> endobj 12 0 obj (Definitions) endobj 13 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 16 0 obj (Continual-Leakage-Resilient Sharing \(CLRS\)) endobj 17 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 20 0 obj (CLRS-Friendly Encryption) endobj 21 0 obj << /S /GoTo /D (section.4) >> endobj 24 0 obj (Scheme Description) endobj 25 0 obj << /S /GoTo /D (section.5) >> endobj 28 0 obj (Security Proof Overview) endobj 29 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 32 0 obj (Alternate Distributions for Keys, Ciphertexts and Updates) endobj 33 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 36 0 obj (The Hybrid Proof Strategy) endobj 37 0 obj << /S /GoTo /D (section.6) >> endobj 40 0 obj (Conclusions) endobj 41 0 obj << /S /GoTo /D (appendix.A) >> endobj 44 0 obj (The Proof in Pictures) endobj 45 0 obj << /S /GoTo /D (appendix.B) >> endobj 48 0 obj (Background Lemmas) endobj 49 0 obj << /S /GoTo /D (subsection.B.1) >> endobj 52 0 obj (Statistical Indistinguishability: Hiding Subspaces and Orthogonality) endobj 53 0 obj << /S /GoTo /D (subsection.B.2) >> endobj 56 0 obj (Computational Indistinguishability: Extended Rank-Hiding Assumption) endobj 57 0 obj << /S /GoTo /D (subsection.B.3) >> endobj 60 0 obj (\(Re\)Programming Updates) endobj 61 0 obj << /S /GoTo /D (appendix.C) >> endobj 64 0 obj (Proof of Security \(Theorem 4.1\)) endobj 65 0 obj << /S /GoTo /D (subsection.C.1) >> endobj 68 0 obj (Hybrid Game Definitions) endobj 69 0 obj << /S /GoTo /D (subsection.C.2) >> endobj 72 0 obj (Hybrid Indistinguishability Arguments) endobj 73 0 obj << /S /GoTo /D (subsection.C.3) >> endobj 76 0 obj (Putting It All Together) endobj 77 0 obj << /S /GoTo /D (appendix.D) >> endobj 80 0 obj (Generalization to k-Linear) endobj 81 0 obj << /S /GoTo /D (subsection.D.1) >> endobj 84 0 obj (Scheme Description) endobj 85 0 obj << /S /GoTo /D (subsection.D.2) >> endobj 88 0 obj (The Generalized Proof \(Sketch\)) endobj 89 0 obj << /S /GoTo /D (appendix.E) >> endobj 92 0 obj (CLRS for General Access Structures) endobj 93 0 obj << /S /GoTo /D (subsection.E.1) >> endobj 96 0 obj (Definition) endobj 97 0 obj << /S /GoTo /D (subsection.E.2) >> endobj 100 0 obj (Scheme Description) endobj 101 0 obj << /S /GoTo /D (subsection.E.3) >> endobj 104 0 obj (Security) endobj 105 0 obj << /S /GoTo /D (appendix.F) >> endobj 108 0 obj (Impossibility of Information-Theoretic Security) endobj 109 0 obj << /S /GoTo /D [110 0 R /FitH] >> endobj 112 0 obj << /Length 2647 /Filter /FlateDecode >> stream xYoݿop8< .(l(jlMM k5%Ţ(qoQ<q>,Py(J0Ye&wcv$uoǁ']an7*T5ob'~Ϯ?