Cryptology ePrint Archive: Report 2008/120
Public key encryption and encryption emulation attacks
Denis Osin and Vladimir Shpilrain
Abstract: The main purpose of this paper is to suggest that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1.
Category / Keywords: public-key cryptography / encryption emulation, unbounded adversary
Date: received 16 Mar 2008
Contact author: shpilrain at yahoo com
Available formats: PDF | BibTeX Citation
Version: 20080317:120226 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]