Research Article

Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

Figure 4

IND--RKA (a) and weak-INT--RKA (b) security games. We note that, in the weak-INT--RKA game, there is a special rule (as shown in the shadow) of outputting in FINALIZE.
(a)
(b)