O'Reilly logo

Modern Cryptography: Theory and Practice by Wenbo Mao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Formal and Strong Security Definitions for Public-Key Cryptosystems

14.1 Introduction

Secrecy is at the heart of cryptography. Let us now reconsider security notions for public-key encryption algorithms. We shall later see that the confidentiality-oriented security notions established in this chapter will have a wider generality for basing other kinds of security services.

So far we have confined ourselves to a very weak confidentiality notion for public-key cryptosystems. The notion is described in Property 8.2 (in §8.2): we only face a passive attacker and such an attacker may break a target cryptosystem only in the “all-or-nothing” sense. This is a typical textbook crypto security notion. It is useless for real applications. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required