Research Article

Symmetric Blind Decryption with Perfect Secrecy

Figure 4

Malicious Alice. The adversary attempts to decrypt additional messages.