2005 | OriginalPaper | Chapter
On the Security Notions for Public-Key Encryption Schemes
Authors : Duong Hieu Phan, David Pointcheval
Published in: Security in Communication Networks
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
In this paper, we revisit the security notions for public-key encryption, and namely indistinguishability. We indeed achieve the surprising result that no decryption query before receiving the challenge ciphertext can be replaced by queries (whatever the number is) after having received the challenge, and vice-versa. This remark leads to a stricter and more complex hierarchy for security notions in the public-key setting: the (
i
,
j
)-
IND
level, in which an adversary can ask at most
i
(
j
resp.) queries before (after resp.) receiving the challenge. Excepted the trivial implications, all the other relations are strict gaps, with no polynomial reduction (under the assumption that
IND
-
CCA2
secure encryption schemes exist.) Similarly, we define different levels for non-malleability (denoted (
i
,
j
)-
NM
.)