TransWikia.com

How are security proofs performed for Certificateless PEKS schemes?

Cryptography Asked by Venkat Chenam on October 24, 2021

I have been studying several CLPEKS (CertificateLess Public-key Encryption scheme with Keyword Search) schemes and I understand the security assumptions and the several types of security models used for the security game between the Challenger and the Adversary.

The paper I’m reading is titled "Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things"

Below you can see picture of the lemma I’m trying to understand. How do they write the probability to solve the CBDH problem?

enter image description here

My question is what is the concept behind that security proof? What is their aim and what are the rules that guide the process?

I need to understand that to apply it to the scheme I am working on.

Add your own answers!

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP