Download Now Free registration required
A recent work by Nuida and Hanaoka provided a proof technique for security of information-theoretically secure cryptographic schemes in which the random input tape is implemented by a PseudoRandom Generator (PRG). In this paper, the authors revisit their proof technique and generalize it by introducing some trade-off factor, which involves the original proof technique as a special case and provides a room of improvement of the preceding result. Also they consider two issues of the preceding result; the requirement of some hardness assumption in their proof and the gap between non-uniform and uniform computational models appearing when transferring from the exact security formulation adopted in the preceding result to the usual asymptotic security.
- Format: PDF
- Size: 234.6 KB