Pseudorandomness and Cryptographic Applications
Pseudorandomness and Cryptographic Applications
The Security of Cipher Block Chaining
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
High-Bandwidth Encryption with Low-Bandwidth Smartcards
Proceedings of the Third International Workshop on Fast Software Encryption
On the Security of Remotely Keyed Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
The design and the security concept of a collaborative whiteboard
Computer Communications
Hi-index | 0.00 |
Remotely keyed encryption schemes (RKESs) support fast encryption and decryption using low-bandwidth devices, such as secure smartcards. The long-lived secret keys never leave the smartcard, but most of the encryption is done on a fast untrusted device, such as the smartcard's host. This paper describes an new scheme, the length-preserving "accelerated remotely keyed" (ARK) encryption scheme and, in a formal model, provides a proof of security. For the sake of practical usability, our model avoids asymptotics. Blaze, Feigenbaum, and Naor gave a general definition for secure RKESs [3]. Compared to their length-preserving scheme, the ARK scheme is more efficient but satisfies the same security requirements.