Sciweavers

TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 4 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein