Research Article

Symmetric Blind Decryption with Perfect Secrecy

Figure 3

Malicious encryptor. The adversary attempts to learn which message was chosen by Alice.