The search functionality is under construction.
The search functionality is under construction.

Information-Theoretic Secrecy with Access to Decryption Oracles

Christopher PORTMANN, Keisuke TANAKA

  • Full Text Views

    0

  • Cite this

Summary :

We analyze the security notion of information-theoretic secrecy against an adversary who can make adaptive queries to the decryption oracle, and show that it is equivalent to requiring that the encryption scheme can perfectly encrypt +1 different messages. This immediately yields a lower bound on the key length and an optimal construction, namely (+1)-wise independent permutations. This also gives an operational interpretation to the notion of decryption oracles in information-theoretic security.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E94-A No.7 pp.1585-1590
Publication Date
2011/07/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E94.A.1585
Type of Manuscript
LETTER
Category
Cryptography and Information Security

Authors

Keyword