Sciweavers

TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 12 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein