Key-Dependent Message Security: Generic Amplification and Completeness

  title={Key-Dependent Message Security: Generic Amplification and Completeness},
  author={Benny Applebaum},
  journal={Journal of Cryptology},
Key-dependent message (KDM) secure encryption schemes provide secrecy even when the attacker sees encryptions of messages related to the secret-key sk. Namely, the scheme should remain secure even when messages of the form f(sk) are encrypted, where f is taken from some function class $\mathcal{F}$ . A KDM amplification procedure takes an encryption scheme which satisfies $\mathcal{F}$ -KDM security, and boosts it into a $\mathcal{G}$ -KDM secure scheme, where the function class $\mathcal{G… CONTINUE READING
Highly Cited
This paper has 102 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 57 extracted citations

Public-Key Cryptography – PKC 2016

Lecture Notes in Computer Science • 2016
View 10 Excerpts
Highly Influenced

KDM-Security via Homomorphic Smooth Projective Hashing

IACR Cryptology ePrint Archive • 2015
View 5 Excerpts
Highly Influenced

New method of key-dependent message security for asymmetric encryption

Security and Communication Networks • 2015
View 6 Excerpts
Highly Influenced

Foundations of garbled circuits

ACM Conference on Computer and Communications Security • 2012
View 5 Excerpts
Highly Influenced

Fiat-Shamir From Simpler Assumptions

IACR Cryptology ePrint Archive • 2018

102 Citations

Citations per Year
Semantic Scholar estimates that this publication has 102 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 33 references

Bounded Key-Dependent Message Security

IACR Cryptology ePrint Archive • 2009
View 10 Excerpts
Highly Influenced

Fully homomorphic encryption using ideal lattices

STOC • 2009
View 8 Excerpts
Highly Influenced

Key-dependent message security: Generic amplification and completeness theorems

B. Applebaum
Cryptology ePrint Archive, • 2010

Similar Papers

Loading similar papers…