Skip to main content
Engineering LibreTexts

☆ Index of Security Definitions

  • Page ID
    92759
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    One-time uniform ciphertexts for symmetric-key encryption (Denition 2.5):

     

    One-time secrecy for symmetric-key encryption (Denition 2.6):

     

    t-out-of-n secret sharing (Denition 3.3):

     

    Pseudorandom generator (Denition 5.1):

     

    Pseudorandom function (Denition 6.1):

     

    Pseudorandom permutation (Denition 6.6):

     

    Strong pseudorandom permutation (Denition 6.13):

     

    CPA security for symmetric-key encryption (Denition 7.1, Section 8.2):

     

    CPA$ security for symmetric-key encryption (Denition 7.2, Section 8.2):

     

    CCA security for symmetric-key encryption (Denition 9.1):

     

    CCA$ security for symmetric-key encryption (Denition 9.2):

     

    MAC (Denition 10.2):

     

    Collision resistance (Denition 11.1):

     

    Digital signatures (Denition 13.6):

     

    Key agreement (Denition 14.4):

     

    Decisional Die-Hellman assumption (Denition 14.5):

     

    CPA security for public-key encryption (Denition 15.1):

     

    CPA$ security for public-key encryption (Denition 15.2):

     

    One-time secrecy for public-key encryption (Denition 15.4):

     

    • Was this article helpful?