Research Article

Symmetric Blind Decryption with Perfect Secrecy

Figure 5

Malicious decryptor. The adversary attempts to learn the plain-text message that Alice obtains.