Cryptography Reference
In-Depth Information
K
key space
E
family
{
E
k
:
k
∈K}
of encryption functions
E
k
:
M→C
D
family
{
D
k
:
K
∈K}
of decryption functions
D
k
:
C→M
T
authentication tag space
A
family
{
A
k
:
k
∈K}
of authentication functions
A
k
:
M→T
V
family
{
V
k
:
K
∈K}
of verification functions
V
k
:
M×T
→{
valid, invalid
}
Γ
access structure (employed by a secret sharing scheme)