Cryptography Reference
In-Depth Information
to B. On the right side, B knows his or her private key k B (representing the trapdoor
information) and can use this key to invert the one-way function and decrypt
m = D B ( c )= D k 1
B
( c ) .
An asymmetric encryption system is a public key cryptosystem. As such, it
can be specified by a set of three algorithms. This is done in Definition 2.10 and
illustrated in Figure 2.8.
$
&
$(
$
$
$(
!
$
Figure 2.8
The three algorithms of an asymmetric encryption system.
Definition 2.10 (Asymmetric encryption system) An asymmetric encryption sys-
tem consists of the following three efficiently computable algorithms:
Generate (1 n ) is a probabilistic key generation algorithm that takes as input
a security parameter 1 n and generates as output a public key pair (consisting
of a public key k and a corresponding private key k 1 ). 7
In most literature, the security parameter is denoted by 1 k (i.e., k written in unary representation).
Because this notation may provide some confusion between k standing for the security parameter
and k standing for the public key, we don't use it in this topic. Instead, we use 1 n to refer to the
security parameter.
7
 
Search WWH ::




Custom Search