Professional Documents
Culture Documents
Tasty: Secrecy
Tasty: Secrecy
Lecture 2021
at mini
Eh I
Em 1 im
be on
KEK
Cb Mb k
I
f
m Mr Me
ki ka ke
11C
computationally
landscape ink
SKE
j
CSI
Encodes Deck
t
PRG IBE ABE
PRF
OWF FAE FE
For all practical purposes
amount of information to
leaks tiny
a Bounded Adversary
80 PT to
Scheme 2 leak some info
It which runs for 100 years
very Small
probability
It succeeds with
Concrete Approach
t E secure if Any A runs for
Probability t
time t sued with
in Practice
Imp
Difficult
Sec Param
I
Asymptotic Approach
It runs in Poly 2
mega Ca
Efficient Adversary
An E on
A n terminates in Pliny
steps
121 7 Size of the input
Po poly
Negligible success probability
fast
if
Alternet f is negligible
T
E IN F no E IN
H e
e
t n no fan s n
n M ta
2 n
E 2
Reposition
is negligible inn
If fans gen
then hens fan t g en
hen is also negligible in N
FL fan s n
G
n
of
h
gen m n ng
9
thenyfn nsn hn
Max Cmf Ng
nege
I Home work
ten fan
pity is also
nee
template
A scheme is seeing if tPPT
is
negligible
necessity of Relation
i
2 pm
given E M
M
A Private Key Ene
k Gen in 114 n
c Enc CK m
m Dec Ck C
t
Correctness pm e on Tk
m M
Deck Enck
IND
EAI
a
ringing
Mo Mi 7
Gen in É imotim
be 0,1
Cb Enck mb
It wins if b b
PrivkEIT
EAV secure if
Tif IND
ameImT
HPPT FY.
Equivalent formulation
Dec IND EAV
T Chen Ene
7
if f PPT A I negeen 011
1
1
n
Pr Out Birk
P Jota Priv
kg n
11 1 Eneseen
individual
Ciphertext leak no info about
bits of the plaintext