SLIDE 1
CS 4803 Computer and Network Security
Alexandra (Sasha) Boldyreva Public-key encryption
1
Recall: symmetric setting
S R A
K K
2
Public-key (asymmetric) setting
S R A
skR pkR
3
Asymmetric encryption schemes
A scheme AE is specified a key generation algorithm K, an encryption algorithm E, and a decryption algorithm D.
Sender S
(pk,sk) K E pk C M D sk C M AE=(K,E,D)
It is required that for every (pk,sk) that can be output by K and every M∈MsgSp(pk), if C=E(pk,M) then D(sk,C)=M
MsgSp(pk)-message space Receiver R
- r ⊥
- r ⊥
4