Search for question
Question

Question 3

3a. Describe, using a diagram, the IND-CCA security game for public-key encryption. (Your

diagram should include clearly the entities in the game, their interaction, and the winning

condition.)

3b. Identify a public-key encryption scheme that satisfies IND-CCA security. For the scheme

you have identified, name the mathematical assumption(s) required for the security to

hold.