Asymmetric Encryption Schemes: IND-CCA #
IND-CCA interfaces and games for asymmetric encryption schemes.
Oracle that uses a secret key to respond to decryption requests.
Invalid ciphertexts become oracle failure in OptionT.
Instances For
IND-CCA adversaries get access to the base oracle set spec plus a decryption oracle.
Challenge generation is handled explicitly between the two phases of the game.
Instances For
Two-phase IND-CCA adversary:
chooseMessages runs before the challenge and outputs (m₀, m₁, st);
distinguish st c⋆ runs after seeing the challenge ciphertext.
- State : Type
- chooseMessages : PK → OracleComp encAlg.IND_CCA_oracleSpec (M × M × self.State)
- distinguish : self.State → C → OracleComp encAlg.IND_CCA_oracleSpec Bool
Instances For
Pre-challenge decryption oracle for the IND-CCA game.
Instances For
Post-challenge decryption oracle for the IND-CCA game.
The challenge ciphertext itself is answered with none, while all other ciphertexts are
decrypted normally.
Instances For
IND-CCA security game in the standard two-phase form.
The adversary chooses challenge messages with access to the decryption oracle, then receives
the challenge ciphertext and continues interacting with a decryption oracle that returns none
on the challenge ciphertext.
Instances For
Real-valued IND-CCA advantage, expressed as the Boolean bias of the IND-CCA game.