Maintaining authenticated communication in the presence of break-insRan CanettiShai Haleviet al.2000Journal of Cryptology