IND-CCA安全的方案:你没法伪造能正常解密的密文(比如公司发给财务一个加密邮件,里面包含了这个月应该打...
INDCCA2完全匿名高效短群签名方案.doc,INDCCA2完全匿名高效短群签名方案 (1.南通大学 计算机科学与技术学院,江苏 南通 226019; 2.南通大学 a.理学院; b.教育科学学院,江苏南通 226007) 摘要:基于DDH、TCRv、KEA3假设下的改进Cramer-Shoup加密方案和SDH假设,提出一
The left-hand side of Fig.2summarizes the relations we show between the notions. An implicationIND-CCA-X→IND-CCA-Ymeans every PKE scheme that isIND-CCA-Xsecure is alsoIND-CCA-Ysecure. A separationIND-CCA-X↛IND-CCA-Ymeans we give an example of a PKE scheme that isIND-CCA-Xsecure b...
IND-CCA security stands for Indistinguishable Chosen Ciphertext Attack. The idea behind it is that in a secure encryption scheme, given a ciphertext, an adversary should not be able to tell what message the given ciphertext encrypts. In this model, the adversary is allowed to call the encryp...
At Crypto'99, Fujisaki and Okamoto [10] presented a nice generic transformation from weak asymmetric and symmetric schemes into an IND-CCA hybrid encryption scheme in the Random Oracle Model. From this transformation, two specific candidates to standardization were designed: EPOC-2 [9] and PSEC2...
IND-CCA安全:和IND-CPA安全一样,除了挑战者额外又提供了一个解密预言机(decryption oracle),敌手可以...