Asymmetric cryptosystems

Also: public-key cryptography.

An asymmetric cryptosystem defines the following operations:

  • Setup: Any operation that describes prerequisites for the cryptosystem, for example the construction of a special group.
  • KeyGen\((\lambda) \mapsto \langle \mathit{pk}, \mathit{sk} \rangle\): Generates a public-secret key pair used to encrypt and decrypt.
  • Encrypt\((m, \mathit{pk}) \mapsto c\): Encrypts a message using the public key into a ciphertext.
  • Decrypt\((c, \mathit{pk}) \mapsto m\): Decrypts a ciphertext using the secret key to recover the plaintext.

Symbol definitions

  • \(\lambda\) - security parameter
  • \(\mathit{pk}\) - public key
  • \(\mathit{sk}\) - secret key
  • \(m\) - plaintext
  • \(c\) - ciphertext