Last Updated:2025/12/06
To evaluate the protocol's robustness, researchers simulated a chosen-ciphertext attack that allowed the adversary to submit arbitrary ciphertexts for decryption and observe the resulting plaintexts.
See correct answer
To evaluate the protocol's robustness, researchers simulated a chosen-ciphertext attack that allowed the adversary to submit arbitrary ciphertexts for decryption and observe the resulting plaintexts.
音声機能が動作しない場合はこちらをご確認ください
Edit Histories(0)
Source Sentence
プロトコルの堅牢性を評価するため、研究者たちは攻撃者が任意の暗号文を選んで復号させ、その結果の平文を観察できるという攻撃をシミュレートした。