How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts
© Thibaut Horel, Sunoo Park, Silas Richelson, and Vinod Vaikuntanathan. In this work, we examine the feasibility of secure and undetectable point-to-point communication when an adversary (e.g., a government) can read all encrypted communications of surveillance targets. We consider a model where the...
Format: | Article |
---|---|
Language: | English |
Published: |
2021-11-04T15:13:48Z.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption
by: Hassan El Gafif, et al.
Published: (2021-01-01) -
Decentralized Broadcast Encryption Schemes with Constant Size Ciphertext and Fast Decryption
by: Qutaibah Malluhi, et al.
Published: (2020-06-01) -
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
by: Jiguo Li, et al.
Published: (2017-01-01) -
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
by: Qi Li, et al.
Published: (2018-01-01) -
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System
by: Leyou Zhang, et al.
Published: (2019-01-01)