3a. Describe, using a diagram, the IND-CCA security game for public-key encryption. (Your
diagram should include clearly the entities in the game, their interaction, and the winning
condition.)
3b. Identify a public-key encryption scheme that satisfies IND-CCA security. For the scheme
you have identified, name the mathematical assumption(s) required for the security to
hold.