Security Parameters in Cryptographic Protocols
For the convenience of research, theoretical cryptographers use Security Parameter to quantify the security of a cryptographic scheme and thus perform security analysis of cryptographic protocols. Before analyzing the security of a cryptographic protocol, it is necessary to set up a certain security model, which includes the assumption of the attacker’s computational power. Shannon’s Information Theory investigates the security of an attacker under the condition of having unlimited computational resources, which we call Information-theoretic security....