IACR News item: 02 July 2014
Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
ePrint Report
We revisit the context of leakage-tolerant interactive protocols as
defined by Bitanski, Canetti and Halevi (TCC 2012). Our contributions
can be summarized as follows:
\\begin{enumerate}
\\item
For the purpose of secure message transmission, any encryption
protocol with message space $\\cM$ and secret key space $\\cSK$
tolerating poly-logarithmic leakage on the secret state of the
receiver must satisfy $|\\cSK| \\ge (1-\\epsilon)|\\cM|$, for every $0
Additional news items may be found on the IACR news page.