On cryptography with auxiliary input



FREE-DOWNLOAD Y Dodis, YT Kalai… – Proceedings of the 41st annual ACM …
We study the question of designing cryptographic schemes which are secure even if an arbitrary
function f(sk) of the secret key is leaked, as long as the secret key sk is still (expo- nentially) hard
to compute from this auxiliary input. This setting of auxiliary input is more general than the