Lecture 16: Public-Key Encryption Schemes (I)
| private-key encryption | public-key encryption |
Sender/encryptor | | |
Receiver/decryptor | | |
EAV-security for public-key encryption schemes
ElGamal Encryption Scheme
Recall Decisional Diffie-Hellman (DDH) assumption
ElGamal encryption scheme
Security proof
Step 2: replace ciphertext with random garbage
Putting it together