Security proof with dishonest keys

Hubert Comon-Lundh, Véronique Cortier, Guillaume Scerri. Security proof with dishonest keys. IACR Cryptology ePrint Archive, 2012:8, 2012. [doi]

@article{Comon-LundhCS12,
  title = {Security proof with dishonest keys},
  author = {Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri},
  year = {2012},
  url = {http://eprint.iacr.org/2012/008},
  note = {informal publication},
  researchr = {https://researchr.org/publication/Comon-LundhCS12},
  cites = {0},
  citedby = {0},
  journal = {IACR Cryptology ePrint Archive},
  volume = {2012},
  pages = {8},
}