Research Article
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
Figure 4
IND--RKA (a) and weak-INT--RKA (b) security games. We note that, in the weak-INT--RKA game, there is a special rule (as shown in the shadow) of outputting in FINALIZE.
(a) |
(b) |