Abstract
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second one relates to computationally secure encryption resisting adaptive chosen ciphertext attacks in streaming mode with bounded resources: memory, time delay or output length. Curiously, both impossibility results can be achieved with either finite or continuous domains. The latter result explains why known CCA-secure cryptosystem constructions require at least two passes to decrypt a message with bounded resources.
Original language | English |
---|---|
Title of host publication | Coding and Cryptology - Second International Workshop, IWCC 2009, Proceedings |
Pages | 202-218 |
Number of pages | 17 |
DOIs | |
Publication status | Published - 2009 |
Externally published | Yes |
Event | International Workshop on Coding and Cryptology 2009 - Zhangjiajie, China Duration: 1 Jun 2009 → 5 Jun 2009 Conference number: 2nd https://link.springer.com/book/10.1007/978-3-642-01877-0 (Proceedings) |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 5557 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | International Workshop on Coding and Cryptology 2009 |
---|---|
Abbreviated title | IWCC 2009 |
Country/Territory | China |
City | Zhangjiajie |
Period | 1/06/09 → 5/06/09 |
Internet address |
|