Paper 2008/120

Public key encryption and encryption emulation attacks

Denis Osin and Vladimir Shpilrain

Abstract

The main purpose of this paper is to suggest that public key encryption can be secure against the "encryption emulation" attack (on the sender's encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
encryption emulationunbounded adversary
Contact author(s)
shpilrain @ yahoo com
History
2008-03-17: received
Short URL
https://ia.cr/2008/120
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/120,
      author = {Denis Osin and Vladimir Shpilrain},
      title = {Public key encryption and encryption emulation attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2008/120},
      year = {2008},
      note = {\url{https://eprint.iacr.org/2008/120}},
      url = {https://eprint.iacr.org/2008/120}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.