CryptoDB
Public key encryption and encryption emulation attacks
Authors: | |
---|---|
Download: | |
Abstract: | The main purpose of this paper is to suggest that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1. |
BibTeX
@misc{eprint-2008-17797, title={Public key encryption and encryption emulation attacks}, booktitle={IACR Eprint archive}, keywords={public-key cryptography / encryption emulation, unbounded adversary}, url={http://eprint.iacr.org/2008/120}, note={ shpilrain@yahoo.com 13954 received 16 Mar 2008}, author={Denis Osin and Vladimir Shpilrain}, year=2008 }