The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] decryption oracle(1hit)

1-1hit
  • Information-Theoretic Secrecy with Access to Decryption Oracles

    Christopher PORTMANN  Keisuke TANAKA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:7
      Page(s):
    1585-1590

    We analyze the security notion of information-theoretic secrecy against an adversary who can make adaptive queries to the decryption oracle, and show that it is equivalent to requiring that the encryption scheme can perfectly encrypt +1 different messages. This immediately yields a lower bound on the key length and an optimal construction, namely (+1)-wise independent permutations. This also gives an operational interpretation to the notion of decryption oracles in information-theoretic security.