1

I am learning about the concept of two security notions called IND-, which include IND-CPA, IND-CCA1 and IND-CCA2. While I got some grasp understanding about the scenarios between the challenger & attacker for each of these models. I am still not able to comprehend what properties of a security model are required to "upgrade" from IND-CPA to IND-CCA1, thus IND-CCA2.

  • Starting with IND-CPA, I understood that each encryption request must "result in randomly different outputs".
  • What are the canonical descriptions for the next 2 transitions (IND-CPA -> IND-CCA1 and IND-CCA1 -> IND-CCA2)? I did some research and got some answers talking about "making the ciphertext tamperproof" (LINK1, LINK2) but still quite confused (e.g., they just mentioned CCA generally).

Thank you in advance.

John Pham
  • 85
  • 4

0 Answers0