{"blog_url":"https://186.hatenablog.com/","version":"1.0","url":"https://186.hatenablog.com/entry/20090901/1251817337","categories":["crypt"],"provider_url":"https://hatena.blog","image_url":null,"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20090901%2F1251817337\" title=\" IND-CCA2\u306e\u5b9a\u7fa9 - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"smoking186","height":"190","provider_name":"Hatena Blog","author_url":"https://blog.hatena.ne.jp/smoking186/","type":"rich","width":"100%","title":" IND-CCA2\u306e\u5b9a\u7fa9","description":"Bellare, Hofheinz, and Kiltz \u201cSubtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disarrowed?\u201d (ePrint 2009/418) \u6697\u53f7\u306eIND-CCA2\u5b89\u5168\u6027\u3082\u5b9a\u7fa9\u306b\u3088\u3063\u3066\u5f37\u3055\u304c\u5909\u308f\u308b\u3068\u3044\u3046\u8a71. \u6575\u304c\u30e1\u30c3\u30bb\u30fc\u30b8\u30922\u3064\u51fa\u3059\u524d\u306b\u884c\u3063\u305f\u5fa9\u53f7\u30af\u30a8\u30ea\u306e\u96c6\u5408\u3092S1, \u30c1\u30e3\u30ec\u30f3\u30b8\u3092\u3082\u3089\u3063\u305f\u5f8c\u306e\u5fa9\u53f7\u30af\u30a8\u30ea\u306e\u96c6\u5408\u3092S2\u3068\u3057\u307e\u3059. IND-CCA2-SP b=b'\u304b\u3064\u30c1\u30e3\u30ec\u30f3\u30b8\u304cS2\u306b\u5165\u3063\u3066\u3044\u306a\u304b\u3063\u305f\u3089\u52dd\u3061 IND-CCA2-BP b=b'\u304b\u3064\u30c1\u30e3\u30ec\u30f3\u30b8\u2026","blog_title":"186 @ hatenablog","published":"2009-09-01 00:02:17"}