Cryptography Reference
In-Depth Information
K
key space
E
family
{
E k : k
∈K}
of encryption functions E k :
M→C
D
family
{
D k : K
∈K}
of decryption functions D k :
C→M
T
authentication tag space
A
family
{
A k : k
∈K}
of authentication functions A k :
M→T
V
family
{
V k : K
∈K}
of verification functions V k :
M×T
→{
valid, invalid
}
Γ
access structure (employed by a secret sharing scheme)
Search WWH ::




Custom Search