International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Public key encryption and encryption emulation attacks

Authors:
Denis Osin
Vladimir Shpilrain
Download:
URL: http://eprint.iacr.org/2008/120
Search ePrint
Search Google
Abstract: The main purpose of this paper is to suggest that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1.
BibTeX
@misc{eprint-2008-17797,
  title={Public key encryption and encryption emulation attacks},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / encryption emulation, unbounded adversary},
  url={http://eprint.iacr.org/2008/120},
  note={ shpilrain@yahoo.com 13954 received 16 Mar 2008},
  author={Denis Osin and Vladimir Shpilrain},
  year=2008
}