Explore chapters and articles related to this topic
Deniable authenticated encryption for e-mail applications
Published in International Journal of Computers and Applications, 2020
Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao
can easily find out from list or list . It means that can solve the CDH problem by interacting with . We assume that the CDH problem is hard, so there is no efficient algorithm that can solve the CDH problem. Thus, the adversary does not exist and our scheme is secure against adaptive chosen ciphertext attack.