Welcome to the resource topic for 2008/120
Public key encryption and encryption emulation attacks
Authors: Denis Osin, Vladimir ShpilrainAbstract:
The main purpose of this paper is to suggest that public key encryption can be secure against the “encryption emulation” attack (on the sender’s encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .