Abstract
Three very different formal definitions of security for public-key cryptosystems have been proposed—two by Goldwasser and Micali and one by Yao. We prove all of them to be equivalent. This equivalence provides evidence that the right formalization of the notion of security has been reached.
The full version of this work will appear in the SIAM Journal of Computing. In the meantime, the full version is available from the authors.
Supported by NSF grant DCR-8413577 and an IBM Faculty Development Award.
Supported by a General Electric Foundation Fellowship and NSF grant DCR-8509905.
Chapter PDF
Similar content being viewed by others
References
R. Boppana, private communication.
H. Chernoff, “A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations,” Annals of Mathematical Statistics 23 (1952).
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, “Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults,” Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1985, pp. 383–95.
W. Diffie and M. E. Hellman, “New direction in cryptography,” IEEE Trans. Inform. Theory,” Vol. IT-22, No. 6, 1976, pp. 644–54.
S. Goldwasser and S. Micali, “Probabilistic Encryption,” JCSS, vol. 28, No. 2, April 1984, pp. 270–99.
W. Rudin, Principles of Mathematical Analysis, 3rd ed., McGraw-Hill, New York, 1976.
C. E. Shannon, “Communication theory of secrecy systems,” Bell System Tech. J., 28 (1949), pp. 656–749.
A. C. Yao, “Theory and Applications of Trapdoor Functions (extended abstract),” Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1982, pp. 80–91.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1987 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Micali, S., Rackoff, C., Sloan, B. (1987). The Notion of Security for Probabilistic Cryptosystems (Extended Abstract). In: Odlyzko, A.M. (eds) Advances in Cryptology — CRYPTO’ 86. CRYPTO 1986. Lecture Notes in Computer Science, vol 263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47721-7_27
Download citation
DOI: https://doi.org/10.1007/3-540-47721-7_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18047-0
Online ISBN: 978-3-540-47721-1
eBook Packages: Springer Book Archive