You are looking at a specific version 20160317:161615 of this paper. See the latest version.

Paper 2016/290

Nonce-Based Cryptography: Retaining Security when Randomness Fails

Mihir Bellare and Björn Tackmann

Abstract

We take nonce-based cryptography beyond symmetric encryption, developing it as a broad and practical way to mitigate damage caused by failures in randomness, whether inadvertent (bugs) or malicious (subversion). We focus on definitions and constructions for nonce-based public-key encryption and briefly treat nonce-based signatures. We introduce and construct hedged extractors as a general tool in this domain. Our nonce-based PKE scheme guarantees that if the adversary wants to violate IND-CCA security then it must do both of the following: (1) fully compromise the RNG (2) penetrate the sender system to exfiltrate a seed used by the sender

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in EUROCRYPT 2016
Keywords
public-key cryptographydigital signaturesrandomness extractionmass surveillance
Contact author(s)
btackmann @ eng ucsd edu
History
2016-03-17: received
Short URL
https://ia.cr/2016/290
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.