Research Article
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
Table 1
Comparison among PKE schemes achieving either KDM-CCA security or security against the set of polynomial functions. Here, we denote by the security parameter and by , , and the set of selection functions, the set of affine functions, and the set of polynomial functions of bounded degree , respectively. “CCA” indicates that the scheme is KDM-CCA secure. By the symbol “?”, we mean that the security proof is not rigorous. , , , , and are the underlying groups, where .