all InfoSec news
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
May 13, 2024, 4:36 a.m. |
IACR News www.iacr.org
ePrint Report: Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
Joseph Jaeger
We show that the adaptive compromise security definitions of Jaeger and Tyagi (Crypto '20) cannot be applied in several natural use-cases. These include proving multi-user security from single-user security, the security of the cascade PRF, and the security of schemes sharing the same ideal primitive. We provide new variants of the definitions and show that they resolve these issues with composition. Extending these definitions to …
attackers cases composability compromise crypto definitions eprint report natural program report security single user security
More from www.iacr.org / IACR News
Post-Doc in Lattice-Based Cryptography
1 day, 19 hours ago |
www.iacr.org
WPEC 2024: NIST Workshop on Privacy Enhancing Cryptography
1 day, 19 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)