PHD-IT-L Archives

September 2013

PHD-IT-L@LISTSERV.GMU.EDU

Options: Use Proportional Font
Show HTML Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
MIME-Version:
1.0
Sender:
Subject:
From:
Damon Mccoy <[log in to unmask]>
Date:
Wed, 18 Sep 2013 15:32:56 +0000
Content-Type:
multipart/alternative; boundary="_000_e7fff5d439674807a571345b87f5e348DM2PR05MB416namprd05pro_"
Comments:
Reply-To:
Damon Mccoy <[log in to unmask]>
Parts/Attachments:
text/plain (896 bytes) , text/html (1470 bytes)
Hello Everyone,

We are having another lunch seminar tomorrow at Noon in 4201. Scott Weeks has volunteered to present this week. No pizza again this week,  so bring your own lunch. I'm also looking for a presenter for next week.

Abstract:

We consider cryptographic systems that use public key encryption (PKE) as a building block in a larger system. We call these cryptosystems "PK-hybrid protocols," and develop a framework for describing such protocols that provides a clear way of describing the role of PKE in the PK-hybrid protocol. By
clarifying and generalizing the role of PKE in such protocols, we are able to state and prove a powerful lemma for proving the security of PK-hybrid protocols. We then show how this lemma can be used in a proof of security for the standard technique of hybrid encryption, substantially simplifying earlier proofs by Cramer and Shoup and by Abe, et al.



ATOM RSS1 RSS2