搜索结果: 1-4 共查到“军队指挥学 IND-CCA”相关记录4条 . 查询时间(0.093 秒)
The security for authenticated encryption schemes is often captured by demanding CCA security (IND-CCA) and integrity of plaintexts (INT-PTXT). In this short note, we prove that this implies in partic...
Post-quantum IND-CCA-secure KEM without Additional Hash
quantum random oracle model key encapsulation mechanism IND-CCA security
2017/11/13
With the gradual progress of NIST's post-quantum cryptography standardization, several practical post-quantum secure key encapsulation mechanism (KEM) schemes have been proposed. Generally, an IND-CCA...
Subtleties in the Definition of IND-CCA:When and How Should Challenge-Decryption be Disallowed?
Definitions foundations encryption
2009/9/2
The definition of IND-CCA disallows an adversary from querying the challenge ciphertext to
its decryption oracle. We point out that there are several ways to formalize this. We show that,
surprising...
On Modeling IND-CCA Security in Cryptographic Protocols
formal cryptography cryptographic protocols probabilistic encryption
2009/4/8
Two common notions of security for public key encryption
schemes are shown to be equivalent: we prove that indistinguishability
against chosen-ciphertext attacks (IND-CCA) is in fact polynomially
e...