首页> 外文会议>International Conference on Security in Communication Networks >On the Security Notions for Public-Key Encryption Schemes
【24h】

On the Security Notions for Public-Key Encryption Schemes

机译:关于公钥加密方案的安全概念

获取原文

摘要

In this paper, we revisit the security notions for public-key encryption, and namely indistinguishability. We indeed achieve the surprising result that no decryption query before receiving the challenge ciphertext can be replaced by queries (whatever the number is) after having received the challenge, and vice-versa. This remark leads to a stricter and more complex hierarchy for security notions in the public-key setting: the (i, j)-IND level, in which an adversary can ask at most i (j resp.) queries before (after resp.) receiving the challenge. Excepted the trivial implications, all the other relations are strict gaps, with no polynomial reduction (under the assumption that IND-CCA2 secure encryption schemes exist.) Similarly, we define different levels for non-malleability (denoted (i,j)-NM.)
机译:在本文中,我们重新审视公钥加密的安全概念,以及违反无法区分。我们确实达到了令人惊讶的结果,在接收挑战密文之前没有解密查询可以通过查询(无论是该数量)替换,并反之亦然。此备注导致公钥设置中的安全概率更严格和更复杂的层次结构:(i,j)-ind级别,其中一个对手可以在最多的i(j resp。)询问之前(resper。 )接受挑战。除了琐碎的影响外,所有其他关系都是严格的差距,没有多项式减少(假设是Ind-CCA2安全加密方案存在。)类似地,我们为非间隙性定义不同的级别(表示(i,j)-nm 。)

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号