1998
DOI: 10.1007/bfb0055718
|View full text |Cite
|
Sign up to set email alerts
|

Relations among notions of security for public-key encryption schemes

Abstract: Abstract. We compare the relative strengths of popular notions of security for public key encryption schemes. We consider the goals of privacy and non-malleability, each under chosen plaintext attack and two kinds of chosen ciphertext attack. For each of the resulting pairs of definitions we prove either an implication (every scheme meeting one no~ion must meet the other) or a separation (there is a scheme meeting one notion but not the other, assuming the first notion can be met at all). We similaxly treat pl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

5
687
1
5

Year Published

2001
2001
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 667 publications
(698 citation statements)
references
References 19 publications
5
687
1
5
Order By: Relevance
“…In our protocols we assume the existence of a semantically secure (in the sense of IND-CPA [BDPR98]) probabilistic public-key encryption function E Z : M×R → E, (m, α) → M , where Z denotes the public key, M denotes a set of messages, R denotes the set of random strings, and E denotes the set of encryptions. We write…”
Section: Homomorphic Encryption Schemementioning
confidence: 99%
“…In our protocols we assume the existence of a semantically secure (in the sense of IND-CPA [BDPR98]) probabilistic public-key encryption function E Z : M×R → E, (m, α) → M , where Z denotes the public key, M denotes a set of messages, R denotes the set of random strings, and E denotes the set of encryptions. We write…”
Section: Homomorphic Encryption Schemementioning
confidence: 99%
“…Syntax of an asymmetric encryption scheme is usually defined as a triple of algorithms (K, E, D), where K returns a pair of both encryption and decryption keys [BDPR98]. But then I is simply a projection and the decryption algorithm simply ignores one of the parameters.…”
Section: Encryption Schemesmentioning
confidence: 99%
“…We require two public key schemes: a public-key encryption scheme, which should be semantically secure under adaptive chosen ciphertext attack (equivalent to IND-CCA2 in the definitions of [2]) 1 , and a publickey signature scheme, which should be existentially unforgeable under adaptive chosen message attack.…”
Section: Cryptographic Algorithmsmentioning
confidence: 99%