Research Article

Tightly Secure Lossy Trapdoor Functions: Constructions and Applications

Box 2

The CCA-secure PKE scheme.
It runs , and , and then returns .
It runs and with branch ,
returns and .
: It first runs to obtain a one-time signature key pair . It then chooses
and , and computes
Finally, it returns .
: It first checks that . If not, it outputs . It then computes
and checks and ; if not, it outputs .
Finally, it outputs .