On the security notions for public-key encryption schemes

8Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we revisit the security notions for public-key encryption, and namely indistinguishability. We indeed achieve the surprising result that no decryption query before receiving the challenge ciphertext can be replaced by queries (whatever the number is) after having received the challenge, and vice-versa. This remark leads to a stricter and more complex hierarchy for security notions in the publickey setting: the (i, j)-IND level, in which an adversary can ask at most i (j resp.) queries before (after resp.) receiving the challenge. Excepted the trivial implications, all the other relations are strict gaps, with no polynomial reduction (under the assumption that IND-CCA2 secure encryption schemes exist.) Similarly, we define different levels for non-malleability (denoted (i, j)-NM.) © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Phan, D. H., & Pointcheval, D. (2005). On the security notions for public-key encryption schemes. In Lecture Notes in Computer Science (Vol. 3352, pp. 33–46). Springer Verlag. https://doi.org/10.1007/978-3-540-30598-9_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free