Definition. A public-key encryption scheme has indistinguishable encryptions in the presence of an eavesdropper if for all probabilistic polynomial-time adversaries , there is a negligible function such that
is run to obtain keys .
Adversary is given , and access to a decryption oracle .
It outputs a pair of messages of the same length, belonging to the message space .
A uniform bit is chosen, and then a ciphertext is computed and given to . We call the challenge ciphertext.
continues to interact with the decryption oracle, but may not request a decryption of itself. Finally, outputs a bit .
succeeds and the output of the experiment is if , and otherwise.
Definition. A public-key encryption scheme has indistinguishable encryptions under a chosen-ciphertext attack, or is CCA-secure, if for all probabilistic polynomial-time adversaries , there exists a negligible function such that
: On input , run to obtain . Choose uniform , compute
The public key is , and the secret private key is .
The message space is .
: Given as inputs the public key , and message , choose uniform .
Output the ciphertext .
: Given as inputs the private key , and ciphertext .
Output .
— Mar 28, 2023
Made with ❤ at Earth.