{"id":"https://openalex.org/W4386328173","doi":"https://doi.org/10.46586/tches.v2023.i4.167-187","title":"On Provable White-Box Security in the Strong Incompressibility Model","display_name":"On Provable White-Box Security in the Strong Incompressibility Model","publication_year":2023,"publication_date":"2023-08-31","ids":{"openalex":"https://openalex.org/W4386328173","doi":"https://doi.org/10.46586/tches.v2023.i4.167-187"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2023.i4.167-187","is_oa":true,"landing_page_url":"http://dx.doi.org/10.46586/tches.v2023.i4.167-187","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11162/10601","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/11162/10601","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063915665","display_name":"Estuardo Alp\u00edrez Bock","orcid":"https://orcid.org/0000-0002-8410-5488"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Estuardo Alpirez Bock","raw_affiliation_strings":["Xiphera LTD, Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Xiphera LTD, Espoo, Finland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070858115","display_name":"Chris Brzuska","orcid":null},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Chris Brzuska","raw_affiliation_strings":["Aalto University, Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University, Espoo, Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034642945","display_name":"Russell W. F. Lai","orcid":"https://orcid.org/0000-0001-9126-1887"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Russell W. F. Lai","raw_affiliation_strings":["Aalto University, Espoo, Finland"],"affiliations":[{"raw_affiliation_string":"Aalto University, Espoo, Finland","institution_ids":["https://openalex.org/I9927081"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063915665"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5348,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72117921,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"167","last_page":"187"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5787011384963989},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5754095315933228},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5413584113121033},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.45054611563682556},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44359099864959717},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4393446743488312},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4387095868587494},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4198340177536011},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3778589963912964},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.35098206996917725},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23863473534584045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2273992896080017}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5787011384963989},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5754095315933228},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5413584113121033},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.45054611563682556},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44359099864959717},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4393446743488312},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4387095868587494},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4198340177536011},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3778589963912964},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.35098206996917725},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23863473534584045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2273992896080017}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2023.i4.167-187","is_oa":true,"landing_page_url":"http://dx.doi.org/10.46586/tches.v2023.i4.167-187","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11162/10601","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/123777","is_oa":true,"landing_page_url":"https://research.aalto.fi/en/publications/0da37293-9336-411a-a562-9621b7f3c3f3","pdf_url":null,"source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},{"id":"pmh:oai:doaj.org/article:ff4106cff73147e89c5175de651ebc5c","is_oa":true,"landing_page_url":"https://doaj.org/article/ff4106cff73147e89c5175de651ebc5c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2023.i4.167-187","is_oa":true,"landing_page_url":"http://dx.doi.org/10.46586/tches.v2023.i4.167-187","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11162/10601","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386328173.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W177462532","https://openalex.org/W1411375199","https://openalex.org/W1505973206","https://openalex.org/W1551163711","https://openalex.org/W1551572898","https://openalex.org/W1553586814","https://openalex.org/W1832187505","https://openalex.org/W1972876358","https://openalex.org/W2100601773","https://openalex.org/W2115221574","https://openalex.org/W2130327142","https://openalex.org/W2168130438","https://openalex.org/W2487384095","https://openalex.org/W2551407130","https://openalex.org/W2557103463","https://openalex.org/W2569709881","https://openalex.org/W2607375226","https://openalex.org/W2898492666","https://openalex.org/W2913810077","https://openalex.org/W2952595778","https://openalex.org/W2952895522","https://openalex.org/W2977279162","https://openalex.org/W3013362696","https://openalex.org/W3013440967","https://openalex.org/W3184795902","https://openalex.org/W3201746109","https://openalex.org/W4240744236","https://openalex.org/W4256439142","https://openalex.org/W4320155108","https://openalex.org/W4360595360"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W2015940479","https://openalex.org/W1906282778","https://openalex.org/W4388469158","https://openalex.org/W1939781145","https://openalex.org/W165895243","https://openalex.org/W1554299772","https://openalex.org/W1558439324"],"abstract_inverted_index":{"Incompressibility":[0],"is":[1,66,94,139,167],"a":[2,12,32,97,114,174,200],"popular":[3],"security":[4,74],"notion":[5,50],"for":[6,142,149,178],"white-box":[7,230],"cryptography":[8],"and":[9,25,59,78,183,235,240],"captures":[10],"that":[11,72,118,158,190],"large":[13],"encryption":[14,92,134,143,206],"program":[15,34],"cannot":[16,82],"be":[17,52,83,197],"compressed":[18,33],"without":[19],"losing":[20],"functionality.":[21],"Fouque,":[22],"Karpman,":[23],"Kirchner":[24],"Minaud":[26],"(FKKM)":[27],"defined":[28],"strong":[29,80,124],"incompressibility,":[30,81],"where":[31,62],"should":[35],"not":[36,140],"even":[37],"help":[38],"to":[39,182],"distinguish":[40],"encryptions":[41],"of":[42,45,100,215],"two":[43],"messages":[44],"equal":[46],"length.":[47],"Equivalently,":[48],"the":[49,63,91,105,137,159,171,209,213,219,226],"can":[51,196],"phrased":[53],"as":[54,173],"indistinguishability":[55],"under":[56,85],"chosen-plaintext":[57],"attacks":[58],"key-leakage":[60],"(LK-IND-CPA),":[61],"leakage":[64,237],"rate":[65],"high.In":[67],"this":[68],"paper,":[69],"we":[70,156],"show":[71],"LK-IND-CPA":[73],"with":[75,107,128,199],"superlogarithmic-length":[76],"leakage,":[77],"thus":[79],"proven":[84],"standard":[86],"(i.e.":[87],"single-stage)":[88],"assumptions,":[89],"if":[90],"scheme":[93],"key-fixing,":[95],"i.e.":[96],"polynomial":[98],"number":[99],"message-ciphertext":[101],"pairs":[102],"uniquely":[103],"determine":[104],"key":[106],"high":[108],"probability.":[109],"Our":[110],"impossibility":[111,210],"result":[112,211],"refutes":[113],"claim":[115,138],"by":[116,185,212],"FKKM":[117,188],"their":[119,191,241],"big-key":[120,193,232],"generation":[121,194],"mechanism":[122,195],"achieves":[123],"incompressibility":[125],"when":[126,169],"combined":[127,198],"any":[129,132],"PRG":[130],"or":[131],"conventional":[133],"scheme,":[135,207],"since":[136],"true":[141],"schemes":[144],"which":[145,151],"are":[146,152],"key-fixing":[147,168],"(or":[148],"PRGs":[150],"injective).":[153],"In":[154],"particular,":[155],"prove":[157,189],"cipher":[160,165,172],"block":[161,164],"chaining":[162],"(CBC)":[163],"mode":[166],"modelling":[170],"truly":[175],"random":[176,201],"permutation":[177],"each":[179],"key.":[180],"Subsequent":[181],"inspired":[184],"our":[186,221],"work,":[187],"original":[192],"oracle":[202],"into":[203],"an":[204,216],"LK-IND-CPA-secure":[205],"circumventing":[208],"use":[214],"idealised":[217],"model.Along":[218],"way,":[220],"work":[222],"also":[223],"helps":[224],"clarifying":[225],"relations":[227],"between":[228],"incompressible":[229],"cryptography,":[231,239],"symmetric":[233],"encryption,":[234],"general":[236],"resilient":[238],"limitations.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
