Paper 2015/003
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security
Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, and Kefei Chen
Abstract
Related-Key Attacks (RKAs) allow an adversary to observe the outcomes of a cryptographic primitive under not only its original secret key e.g.,
Note: Fixed a minor error in the definition of Game 1 in Fig.3 and some typos.
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published by the IACR in PKC 2015
- Keywords
- Related-key attacksnon-malleable key derivationone-time lossy filter
- Contact author(s)
-
qinbaodong @ sjtu edu cn
slliu @ sjtu edu cn - History
- 2015-01-10: revised
- 2015-01-05: received
- See all versions
- Short URL
- https://ia.cr/2015/003
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/003, author = {Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen}, title = {Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/003}, year = {2015}, url = {https://eprint.iacr.org/2015/003} }