Paper 2022/689
Tight Multi-User Security Bound of
Abstract
In CRYPTO'21, Shen et al. have proved in the ideal cipher model that
Note: We have revised the paper after incorporating the review comments of ToSC 2023, Issue I
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published by the IACR in TOSC 2023
- Keywords
- DbHtSPRFPolyhashH-Coefficient TechniqueMirror Theory.
- Contact author(s)
-
nilanjan_isi_jrf @ yahoo com
avirocks dutta13 @ gmail com
mridul nandi @ gmail com
suprita45 @ gmail com - History
- 2023-02-07: last of 3 revisions
- 2022-05-31: received
- See all versions
- Short URL
- https://ia.cr/2022/689
- License
-
CC0
BibTeX
@misc{cryptoeprint:2022/689, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Suprita Talnikar}, title = {Tight Multi-User Security Bound of $\textsf{{DbHtS}}$}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/689}, year = {2022}, url = {https://eprint.iacr.org/2022/689} }