搜索结果: 1-4 共查到“军队指挥学 IND-CCA”相关记录4条 . 查询时间(0.078 秒)
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT
IND-CCA INT-CTXT
font style='font-size:12px;'>
2018/2/8
The security for authenticated encryption schemes is often captured by demanding CCA security (IND-CCA) and integrity of plaintexts (INT-PTXT). In this short note, we prove that this implies in partic...
Post-quantum IND-CCA-secure KEM without Additional Hash
quantum random oracle model key encapsulation mechanism IND-CCA security
font style='font-size:12px;'>
2017/11/13
With the gradual progress of NIST's post-quantum cryptography standardization, several practical post-quantum secure key encapsulation mechanism (KEM) schemes have been proposed. Generally, an IND-CCA...
Subtleties in the Definition of IND-CCA:When and How Should Challenge-Decryption be Disallowed?
Definitions foundations encryption
font style='font-size:12px;'>
2009/9/2
The definition of IND-CCA disallows an adversary from querying the challenge ciphertext to
its decryption oracle. We point out that there are several ways to formalize this. We show that,
surprising...
On Modeling IND-CCA Security in Cryptographic Protocols
formal cryptography cryptographic protocols probabilistic encryption
font style='font-size:12px;'>
2009/4/8
Two common notions of security for public key encryption
schemes are shown to be equivalent: we prove that indistinguishability
against chosen-ciphertext attacks (IND-CCA) is in fact polynomially
e...