Cryptology ePrint Archive: Report 2008/120

Public key encryption and encryption emulation attacks

Denis Osin and Vladimir Shpilrain

Abstract: The main purpose of this paper is to suggest that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1.

Category / Keywords: public-key cryptography / encryption emulation, unbounded adversary

Date: received 16 Mar 2008

Contact author: shpilrain at yahoo com

Available format(s): PDF | BibTeX Citation

Version: 20080317:120226 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]