. "960585"^^ . . . "\u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u0435\u0441\u043A\u0438 \u0441\u0442\u043E\u0439\u043A\u043E\u0439 \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u043E\u0439 \u0432 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0438 \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u0442\u0441\u044F \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u0430, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u043D\u0435 \u0434\u043E\u043F\u0443\u0441\u043A\u0430\u0435\u0442 \u043D\u0438\u043A\u0430\u043A\u043E\u0439 \u0443\u0442\u0435\u0447\u043A\u0438 \u0438\u0437 \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442\u0430 \u0437\u043D\u0430\u0447\u0438\u043C\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E\u0431 \u0438\u0441\u0445\u043E\u0434\u043D\u043E\u043C \u043E\u0442\u043A\u0440\u044B\u0442\u043E\u043C \u0442\u0435\u043A\u0441\u0442\u0435. \u0412\u043E\u0437\u044C\u043C\u0435\u043C \u043B\u044E\u0431\u043E\u0439 \u0432\u0435\u0440\u043E\u044F\u0442\u043D\u043E\u0441\u0442\u043D\u044B\u0439 \u0430\u043B\u0433\u043E\u0440\u0438\u0442\u043C \u043A\u043B\u0430\u0441\u0441\u0430 PP, \u043D\u0430 \u0432\u0445\u043E\u0434 \u043A\u043E\u0442\u043E\u0440\u043E\u0433\u043E \u0432 \u043F\u0435\u0440\u0432\u043E\u043C \u0441\u043B\u0443\u0447\u0430\u0435 \u043F\u043E\u0434\u0430\u044E\u0442\u0441\u044F \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442 \u043D\u0435\u043A\u043E\u0442\u043E\u0440\u043E\u0433\u043E \u0441\u043B\u0443\u0447\u0430\u0439\u043D\u043E\u0433\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F \u0438 \u0434\u043B\u0438\u043D\u0430 \u044D\u0442\u043E\u0433\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F, \u0430 \u0432\u043E \u0432\u0442\u043E\u0440\u043E\u043C \u0441\u043B\u0443\u0447\u0430\u0435 \u2014 \u0442\u043E\u043B\u044C\u043A\u043E \u0434\u043B\u0438\u043D\u0430 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F. \u0415\u0441\u043B\u0438 \u0440\u0430\u0437\u043D\u0438\u0446\u0430 \u043C\u0435\u0436\u0434\u0443 \u0432\u0435\u0440\u043E\u044F\u0442\u043D\u043E\u0441\u0442\u044F\u043C\u0438 \u043F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u044F \u043D\u0435\u043A\u043E\u0442\u043E\u0440\u043E\u0439 \u0434\u043E\u0441\u0442\u043E\u0432\u0435\u0440\u043D\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E\u0431 \u0438\u0441\u0445\u043E\u0434\u043D\u043E\u043C \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0438 \u0432 \u043F\u0435\u0440\u0432\u043E\u043C \u0438 \u0432\u043E \u0432\u0442\u043E\u0440\u043E\u043C \u0441\u043B\u0443\u0447\u0430\u044F\u0445 \u043F\u0440\u0435\u043D\u0435\u0431\u0440\u0435\u0436\u0438\u043C\u043E \u043C\u0430\u043B\u0430, \u0442\u043E \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u0430, \u043A\u043E\u0442\u043E\u0440\u043E\u0439 \u043F\u0440\u043E\u0438\u0437\u0432\u0435\u0434\u0435\u043D\u043E \u0434\u0430\u043D\u043D\u043E\u0435 \u0448\u0438\u0444\u0440\u043E\u0432\u0430\u043D\u0438\u0435, \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044F \u0441\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u0435\u0441\u043A\u0438 \u0441\u0442\u043E\u0439\u043A\u043E\u0439. \u0421 \u0442\u043E\u0447\u043A\u0438 \u0437\u0440\u0435\u043D\u0438\u044F \u0432\u044B\u0447\u0438\u0441\u043B\u0438\u0442\u0435\u043B\u044C\u043D\u043E\u0439 \u0441\u043B\u043E\u0436\u043D\u043E\u0441\u0442\u0438, \u044D\u0442\u043E \u043F\u043E\u043D\u044F\u0442\u0438\u0435 \u0430\u043D\u0430\u043B\u043E\u0433\u0438\u0447\u043D\u043E \u0430\u0431\u0441\u043E\u043B\u044E\u0442\u043D\u043E \u0441\u0442\u043E\u0439\u043A\u043E\u043C\u0443 \u0448\u0438\u0444\u0440\u0443 \u0428\u0435\u043D\u043D\u043E\u043D\u0430. \u0410\u0431\u0441\u043E\u043B\u044E\u0442\u043D\u043E \u0441\u0442\u043E\u0439\u043A\u0438\u0439 \u0448\u0438\u0444\u0440 \u043F\u0440\u0435\u0434\u043F\u043E\u043B\u0430\u0433\u0430\u0435\u0442 \u043D\u0435\u0432\u043E\u0437\u043C\u043E\u0436\u043D\u043E\u0441\u0442\u044C \u043F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u044F \u043A\u0430\u043A\u043E\u0439-\u043B\u0438\u0431\u043E \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E\u0431 \u0438"@ru . . "La s\u00E9curit\u00E9 s\u00E9mantique est une notion de s\u00E9curit\u00E9 importante dans le cadre des preuves de s\u00E9curit\u00E9 des protocoles cryptographiques. Cette notion a \u00E9t\u00E9 introduite en 1984 par Shafi Goldwasser et Silvio Micali. Elle est d\u00E9finie ind\u00E9pendamment du type de cryptographie du syst\u00E8me (c\u2019est-\u00E0-dire sym\u00E9trique ou asym\u00E9trique), mais est principalement utilis\u00E9e dans les preuves des sch\u00E9mas \u00E0 clef publique."@fr . . . "\u8BED\u4E49\u5B89\u5168\uFF08\u82F1\u8A9E\uFF1ASemantic Security\uFF09\u662F\u5BC6\u7801\u5B66\u4E2D\u7684\u672F\u8BED\u3002\u5982\u679C\u5DF2\u77E5\u67D0\u6BB5\u672A\u77E5\u6587\u6BB5\u7684\u5BC6\u6587\u4E0D\u4F1A\u6CC4\u9732\u4EFB\u4F55\u8BE5\u6587\u6BB5\u7684\u5176\u4F59\u4FE1\u606F\uFF0C\u90A3\u4E48\u5219\u79F0\u8BE5\u5BC6\u6587\u662F\u8BED\u4E49\u5B89\u5168\u7684\u3002\u5177\u4F53\u800C\u8A00\uFF0C\u7ED9\u5B9A\u67D0\u6761\u6D88\u606F\uFF08\u6D88\u606F\u6EE1\u8DB3\u4EFB\u610F\u6982\u7387\u5206\u5E03\uFF09\u7684\u5BC6\u6587\u548C\u6D88\u606F\u7684\u957F\u5EA6\uFF0C\u4EFB\u4F55\u6982\u7387\u591A\u9879\u5F0F\u65F6\u95F4\u7B97\u6CD5\uFF08PPTA\uFF09\u90FD\u4E0D\u80FD\u4EE5\u4E0D\u53EF\u5FFD\u7565\u5730\u9AD8\u4E8E\u4EFB\u4F55\u4EC5\u8F93\u5165\u6D88\u606F\u957F\u5EA6\uFF08\u800C\u4E0D\u542B\u5BC6\u6587\uFF09\u7684\u5176\u4ED6PPTA\u7684\u6982\u7387\u83B7\u5F97\u6D88\u606F\u7684\u90E8\u5206\u4FE1\u606F\u3002 \u8BE5\u6982\u5FF5\u76F8\u4F3C\u4E8E\u9999\u519C\u7684\u5B8C\u5584\u4FDD\u5BC6\u6027\u5B9A\u4E49\u3002\u5B8C\u5584\u4FDD\u5BC6\u6027\u610F\u5473\u5BC6\u6587\u4E0D\u4F1A\u6CC4\u9732\u4EFB\u4F55\u660E\u6587\u7684\u4FE1\u606F\uFF0C\u800C\u8BED\u4E49\u5B89\u5168\u4FA7\u91CD\u8868\u793A\u88AB\u63ED\u9732\u7684\u4FE1\u606F\u4E0D\u4F1A\u88AB\u5B9E\u9645\u7A83\u53D6\u3002"@zh . "6623"^^ . . . . "\u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u0435\u0441\u043A\u0430\u044F \u0441\u0442\u043E\u0439\u043A\u043E\u0441\u0442\u044C"@ru . . . "La s\u00E9curit\u00E9 s\u00E9mantique est une notion de s\u00E9curit\u00E9 importante dans le cadre des preuves de s\u00E9curit\u00E9 des protocoles cryptographiques. Cette notion a \u00E9t\u00E9 introduite en 1984 par Shafi Goldwasser et Silvio Micali. Elle est d\u00E9finie ind\u00E9pendamment du type de cryptographie du syst\u00E8me (c\u2019est-\u00E0-dire sym\u00E9trique ou asym\u00E9trique), mais est principalement utilis\u00E9e dans les preuves des sch\u00E9mas \u00E0 clef publique. La s\u00E9curit\u00E9 s\u00E9mantique traduit formellement le fait qu\u2019il doit \u00EAtre difficile de retrouver de l\u2019information sur le message originel en ayant acc\u00E8s au chiffrement de ce message et aux informations publiques du protocole."@fr . "\u8BED\u4E49\u5B89\u5168"@zh . . "In crittografia si definisce sicurezza semantica un criterio di valutazione della sicurezza in un cifrario a chiave asimmetrica. Affinch\u00E9 un sistema crittografico si possa definire semanticamente sicuro un attaccante che disponga di una potenza di calcolo limitata deve essere incapace di derivare delle informazioni significative sul messaggio (il testo in chiaro) dato il solo testo cifrato e la corrispondente chiave pubblica. La sicurezza semantica tiene conto solo del caso di un attaccante passivo, vale a dire che osserva soltanto la generazione di testi cifrati. A differenza di altre definizioni di sicurezza, quella semantica non considera il caso di un attaccante in grado di richiedere la decifratura di testi cifrati scelti (attacco con testo cifrato scelto): molti schemi di cifratura semanticamente sicuri sono spesso insicuri contro scenari di questo tipo. Come conseguenza di ci\u00F2, la sicurezza semantica \u00E8 oggi considerata una condizione insufficiente per stabilire il livello di sicurezza di uno schema di cifratura di uso generale. La nozione di sicurezza semantica fu esposta per la prima volta da Shafi Goldwasser e Silvio Micali in una loro pubblicazione del 1982. Tuttavia, la definizione che essi inizialmente proposero non offriva nessun metodo semplice per dimostrare la sicurezza dei sistemi crittografici reali. Gli autori in seguito dimostrarono che la sicurezza semantica \u00E8 equivalente alla propriet\u00E0 dell'. Questa equivalenza permise di verificare la sicurezza dei sistemi crittografici reali, tanto che la definizione di indistinguibilit\u00E0 \u00E8 ora usata molto pi\u00F9 frequentemente della prima definizione di sicurezza semantica. L'indistinguibilit\u00E0 sotto un attacco con testo in chiaro scelto \u00E8 definita comunemente dal seguente gioco: 1. \n* Ad un attaccante con un tempo di calcolo limitato \u00E8 data una chiave pubblica, che pu\u00F2 usare per generare qualsiasi numero di testi cifrati; 2. \n* l'avversario genera 2 messaggi di lunghezza identica e e li invia ad un oracolo insieme alla chiave pubblica; 3. \n* l'oracolo seleziona 1 dei 2 messaggi lanciando una moneta, lo cifra con la chiave pubblica, e restituisce il testo cifrato risultante. Il sistema crittografico in esame \u00E8 considerato indistinguibilmente sicuro sotto un attacco con testo in chiaro scelto (e quindi semanticamente sicuro sotto il medesimo attacco) se l'avversario non pu\u00F2 determinare quale dei 2 messaggi \u00E8 stato scelto e cifrato dall'oracolo con una probabilit\u00E0 significativamente pi\u00F9 grande di (il tasso di successo di una scelta casuale). Le varianti di questa definizione definiscono l'indistinguibilit\u00E0 sotto un attacco con testo cifrato scelto ed un . A causa del fatto che l'attaccante possiede la chiave pubblica di cifratura, uno schema di cifratura semanticamente sicuro deve essere per definizione probabilistico, possedere cio\u00E8 una componente di casualit\u00E0: se questo non accade, l'attaccante pu\u00F2 semplicemente calcolare la cifratura deterministica di e e comparare i risultati con il testo cifrato restituito dall'oracolo per indovinare la sua scelta con successo. Algoritmi di cifratura semanticamente sicuri sono il , l'ElGamal ed il : questi schemi sono considerati provatamente sicuri dato che la loro sicurezza semantica pu\u00F2 essere ridotta alla risoluzione di alcuni problemi matematici difficilmente risolvibili."@it . "1045913827"^^ . . . . . . "\u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u0430 \u0441\u0442\u0456\u0439\u043A\u0456\u0441\u0442\u044C \u2014 \u0445\u0430\u0440\u0430\u043A\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043A\u0430 \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C \u0432 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0456\u0457. \u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u043E \u0441\u0442\u0456\u0439\u043A\u0438\u043C\u0438 \u0454 \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u0438, \u0432 \u043A\u043E\u0442\u0440\u0438\u0445 \u0437 \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442\u0443 \u043C\u043E\u0436\u043D\u0430 \u0432\u0438\u0442\u044F\u0433\u043D\u0443\u0442\u0438 \u043B\u0438\u0448\u0435 \u043D\u0435\u0437\u043D\u0430\u0447\u043D\u0443 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u044E \u043F\u0440\u043E \u0432\u0456\u0434\u043A\u0440\u0438\u0442\u0438\u0439 \u0442\u0435\u043A\u0441\u0442. \u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u0430 \u0441\u0442\u0456\u0439\u043A\u0456\u0441\u0442\u044C \u0454 \u0430\u043D\u0430\u043B\u043E\u0433\u043E\u043C \u043A\u043E\u043D\u0446\u0435\u043F\u0446\u0456\u0457 \u0428\u0435\u043D\u043D\u043E\u043D\u0430. \u0411\u0435\u0437\u0443\u043C\u043E\u0432\u043D\u0430 \u0431\u0435\u0437\u043F\u0435\u043A\u0430 \u043E\u0437\u043D\u0430\u0447\u0430\u0454, \u0449\u043E \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442 \u043D\u0435 \u0440\u043E\u0437\u043A\u0440\u0438\u0432\u0430\u0454 \u0436\u043E\u0434\u043D\u043E\u0457 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u0457 \u043F\u0440\u043E \u0432\u0456\u0434\u043A\u0440\u0438\u0442\u0438\u0439 \u0442\u0435\u043A\u0441\u0442, \u0442\u043E\u0434\u0456 \u044F\u043A \u0441\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u0430 \u0441\u0442\u0456\u0439\u043A\u0456\u0441\u0442\u044C \u043F\u0435\u0440\u0435\u0434\u0431\u0430\u0447\u0430\u0454, \u0449\u043E \u0431\u0443\u0434\u044C-\u044F\u043A\u0443 \u0440\u043E\u0437\u043A\u0440\u0438\u0442\u0443 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u044E \u043D\u0435\u043C\u043E\u0436\u043B\u0438\u0432\u043E \u0432\u0438\u0442\u044F\u0433\u043D\u0443\u0442\u0438 \u0432\u0438\u043A\u043E\u043D\u0443\u0454\u043C\u0438\u043C \u0447\u0438\u043D\u043E\u043C."@uk . . . . . . "\u8BED\u4E49\u5B89\u5168\uFF08\u82F1\u8A9E\uFF1ASemantic Security\uFF09\u662F\u5BC6\u7801\u5B66\u4E2D\u7684\u672F\u8BED\u3002\u5982\u679C\u5DF2\u77E5\u67D0\u6BB5\u672A\u77E5\u6587\u6BB5\u7684\u5BC6\u6587\u4E0D\u4F1A\u6CC4\u9732\u4EFB\u4F55\u8BE5\u6587\u6BB5\u7684\u5176\u4F59\u4FE1\u606F\uFF0C\u90A3\u4E48\u5219\u79F0\u8BE5\u5BC6\u6587\u662F\u8BED\u4E49\u5B89\u5168\u7684\u3002\u5177\u4F53\u800C\u8A00\uFF0C\u7ED9\u5B9A\u67D0\u6761\u6D88\u606F\uFF08\u6D88\u606F\u6EE1\u8DB3\u4EFB\u610F\u6982\u7387\u5206\u5E03\uFF09\u7684\u5BC6\u6587\u548C\u6D88\u606F\u7684\u957F\u5EA6\uFF0C\u4EFB\u4F55\u6982\u7387\u591A\u9879\u5F0F\u65F6\u95F4\u7B97\u6CD5\uFF08PPTA\uFF09\u90FD\u4E0D\u80FD\u4EE5\u4E0D\u53EF\u5FFD\u7565\u5730\u9AD8\u4E8E\u4EFB\u4F55\u4EC5\u8F93\u5165\u6D88\u606F\u957F\u5EA6\uFF08\u800C\u4E0D\u542B\u5BC6\u6587\uFF09\u7684\u5176\u4ED6PPTA\u7684\u6982\u7387\u83B7\u5F97\u6D88\u606F\u7684\u90E8\u5206\u4FE1\u606F\u3002 \u8BE5\u6982\u5FF5\u76F8\u4F3C\u4E8E\u9999\u519C\u7684\u5B8C\u5584\u4FDD\u5BC6\u6027\u5B9A\u4E49\u3002\u5B8C\u5584\u4FDD\u5BC6\u6027\u610F\u5473\u5BC6\u6587\u4E0D\u4F1A\u6CC4\u9732\u4EFB\u4F55\u660E\u6587\u7684\u4FE1\u606F\uFF0C\u800C\u8BED\u4E49\u5B89\u5168\u4FA7\u91CD\u8868\u793A\u88AB\u63ED\u9732\u7684\u4FE1\u606F\u4E0D\u4F1A\u88AB\u5B9E\u9645\u7A83\u53D6\u3002"@zh . . "Semantic security"@en . . . . . "Sicurezza semantica"@it . . "S\u00E9curit\u00E9 s\u00E9mantique"@fr . . . . . . . . . . . . "In crittografia si definisce sicurezza semantica un criterio di valutazione della sicurezza in un cifrario a chiave asimmetrica. Affinch\u00E9 un sistema crittografico si possa definire semanticamente sicuro un attaccante che disponga di una potenza di calcolo limitata deve essere incapace di derivare delle informazioni significative sul messaggio (il testo in chiaro) dato il solo testo cifrato e la corrispondente chiave pubblica. L'indistinguibilit\u00E0 sotto un attacco con testo in chiaro scelto \u00E8 definita comunemente dal seguente gioco:"@it . "Seguran\u00E7a sem\u00E2ntica"@pt . . . "Em criptografia, um sistema criptogr\u00E1fico \u00E9 semanticamente seguro se nenhum algoritmo probabil\u00EDstico de tempo polinomial (PPTA) que, quando recebe o texto cifrado de uma determinada mensagem (obtido de qualquer distribui\u00E7\u00E3o de mensagens) e o comprimento da mensagem, consegue determinar qualquer informa\u00E7\u00E3o parcial sobre a mensagem com probabilidade n\u00E3o insignificante maior do que todos os outros PPTA que s\u00F3 t\u00EAm acesso ao tamanho da mensagem (e n\u00E3o o texto cifrado). Em outras palavras, o conhecimento do texto cifrado (e seu comprimento) de alguma mensagem desconhecida n\u00E3o revela nenhuma informa\u00E7\u00E3o adicional sobre a mensagem que, possivelmente, pode ser extra\u00EDda. Este conceito \u00E9 o an\u00E1logo da complexidade computacional ao conceito de sigilo perfeito de Shannon. Sigilo perfeito significa que o texto cifrado n\u00E3o revela nenhuma informa\u00E7\u00E3o sobre o texto puro, enquanto que a seguran\u00E7a sem\u00E2ntica implica que qualquer informa\u00E7\u00E3o revelada n\u00E3o pode ser extra\u00EDda."@pt . . "Em criptografia, um sistema criptogr\u00E1fico \u00E9 semanticamente seguro se nenhum algoritmo probabil\u00EDstico de tempo polinomial (PPTA) que, quando recebe o texto cifrado de uma determinada mensagem (obtido de qualquer distribui\u00E7\u00E3o de mensagens) e o comprimento da mensagem, consegue determinar qualquer informa\u00E7\u00E3o parcial sobre a mensagem com probabilidade n\u00E3o insignificante maior do que todos os outros PPTA que s\u00F3 t\u00EAm acesso ao tamanho da mensagem (e n\u00E3o o texto cifrado). Em outras palavras, o conhecimento do texto cifrado (e seu comprimento) de alguma mensagem desconhecida n\u00E3o revela nenhuma informa\u00E7\u00E3o adicional sobre a mensagem que, possivelmente, pode ser extra\u00EDda. Este conceito \u00E9 o an\u00E1logo da complexidade computacional ao conceito de sigilo perfeito de Shannon. Sigilo perfeito significa que "@pt . . "In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ciphertext of a certain message (taken from any distribution of messages), and the message's length, cannot determine any partial information on the message with probability non-negligibly higher than all other PPTA's that only have access to the message length (and not the ciphertext). This concept is the computational complexity analogue to Shannon's concept of perfect secrecy. Perfect secrecy means that the ciphertext reveals no information at all about the plaintext, whereas semantic security implies that any information revealed cannot be feasibly extracted."@en . . "\u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u0430 \u0441\u0442\u0456\u0439\u043A\u0456\u0441\u0442\u044C"@uk . . "\u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u0435\u0441\u043A\u0438 \u0441\u0442\u043E\u0439\u043A\u043E\u0439 \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u043E\u0439 \u0432 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0438 \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u0442\u0441\u044F \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u0430, \u043A\u043E\u0442\u043E\u0440\u0430\u044F \u043D\u0435 \u0434\u043E\u043F\u0443\u0441\u043A\u0430\u0435\u0442 \u043D\u0438\u043A\u0430\u043A\u043E\u0439 \u0443\u0442\u0435\u0447\u043A\u0438 \u0438\u0437 \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442\u0430 \u0437\u043D\u0430\u0447\u0438\u043C\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E\u0431 \u0438\u0441\u0445\u043E\u0434\u043D\u043E\u043C \u043E\u0442\u043A\u0440\u044B\u0442\u043E\u043C \u0442\u0435\u043A\u0441\u0442\u0435. \u0412\u043E\u0437\u044C\u043C\u0435\u043C \u043B\u044E\u0431\u043E\u0439 \u0432\u0435\u0440\u043E\u044F\u0442\u043D\u043E\u0441\u0442\u043D\u044B\u0439 \u0430\u043B\u0433\u043E\u0440\u0438\u0442\u043C \u043A\u043B\u0430\u0441\u0441\u0430 PP, \u043D\u0430 \u0432\u0445\u043E\u0434 \u043A\u043E\u0442\u043E\u0440\u043E\u0433\u043E \u0432 \u043F\u0435\u0440\u0432\u043E\u043C \u0441\u043B\u0443\u0447\u0430\u0435 \u043F\u043E\u0434\u0430\u044E\u0442\u0441\u044F \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442 \u043D\u0435\u043A\u043E\u0442\u043E\u0440\u043E\u0433\u043E \u0441\u043B\u0443\u0447\u0430\u0439\u043D\u043E\u0433\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F \u0438 \u0434\u043B\u0438\u043D\u0430 \u044D\u0442\u043E\u0433\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F, \u0430 \u0432\u043E \u0432\u0442\u043E\u0440\u043E\u043C \u0441\u043B\u0443\u0447\u0430\u0435 \u2014 \u0442\u043E\u043B\u044C\u043A\u043E \u0434\u043B\u0438\u043D\u0430 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F. \u0415\u0441\u043B\u0438 \u0440\u0430\u0437\u043D\u0438\u0446\u0430 \u043C\u0435\u0436\u0434\u0443 \u0432\u0435\u0440\u043E\u044F\u0442\u043D\u043E\u0441\u0442\u044F\u043C\u0438 \u043F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u044F \u043D\u0435\u043A\u043E\u0442\u043E\u0440\u043E\u0439 \u0434\u043E\u0441\u0442\u043E\u0432\u0435\u0440\u043D\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E\u0431 \u0438\u0441\u0445\u043E\u0434\u043D\u043E\u043C \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0438 \u0432 \u043F\u0435\u0440\u0432\u043E\u043C \u0438 \u0432\u043E \u0432\u0442\u043E\u0440\u043E\u043C \u0441\u043B\u0443\u0447\u0430\u044F\u0445 \u043F\u0440\u0435\u043D\u0435\u0431\u0440\u0435\u0436\u0438\u043C\u043E \u043C\u0430\u043B\u0430, \u0442\u043E \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u0430, \u043A\u043E\u0442\u043E\u0440\u043E\u0439 \u043F\u0440\u043E\u0438\u0437\u0432\u0435\u0434\u0435\u043D\u043E \u0434\u0430\u043D\u043D\u043E\u0435 \u0448\u0438\u0444\u0440\u043E\u0432\u0430\u043D\u0438\u0435, \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044F \u0441\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u0435\u0441\u043A\u0438 \u0441\u0442\u043E\u0439\u043A\u043E\u0439. \u0421 \u0442\u043E\u0447\u043A\u0438 \u0437\u0440\u0435\u043D\u0438\u044F \u0432\u044B\u0447\u0438\u0441\u043B\u0438\u0442\u0435\u043B\u044C\u043D\u043E\u0439 \u0441\u043B\u043E\u0436\u043D\u043E\u0441\u0442\u0438, \u044D\u0442\u043E \u043F\u043E\u043D\u044F\u0442\u0438\u0435 \u0430\u043D\u0430\u043B\u043E\u0433\u0438\u0447\u043D\u043E \u0430\u0431\u0441\u043E\u043B\u044E\u0442\u043D\u043E \u0441\u0442\u043E\u0439\u043A\u043E\u043C\u0443 \u0448\u0438\u0444\u0440\u0443 \u0428\u0435\u043D\u043D\u043E\u043D\u0430. \u0410\u0431\u0441\u043E\u043B\u044E\u0442\u043D\u043E \u0441\u0442\u043E\u0439\u043A\u0438\u0439 \u0448\u0438\u0444\u0440 \u043F\u0440\u0435\u0434\u043F\u043E\u043B\u0430\u0433\u0430\u0435\u0442 \u043D\u0435\u0432\u043E\u0437\u043C\u043E\u0436\u043D\u043E\u0441\u0442\u044C \u043F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u044F \u043A\u0430\u043A\u043E\u0439-\u043B\u0438\u0431\u043E \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043E\u0431 \u0438\u0441\u0445\u043E\u0434\u043D\u043E\u043C \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0438 \u0432 \u043F\u0440\u0438\u043D\u0446\u0438\u043F\u0435, \u0432 \u0442\u043E \u0432\u0440\u0435\u043C\u044F \u043A\u0430\u043A \u0441\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u0435\u0441\u043A\u0430\u044F \u0441\u0442\u043E\u0439\u043A\u043E\u0441\u0442\u044C \u043F\u043E\u0434\u0440\u0430\u0437\u0443\u043C\u0435\u0432\u0430\u0435\u0442, \u0447\u0442\u043E \u043D\u0438\u043A\u0430\u043A\u0430\u044F \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u044F \u043E\u0431 \u0438\u0441\u0445\u043E\u0434\u043D\u043E\u043C \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0438, \u043E\u0431\u043D\u0430\u0440\u0443\u0436\u0435\u043D\u043D\u0430\u044F \u0432 \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442\u0435, \u043D\u0435 \u043C\u043E\u0436\u0435\u0442 \u0431\u044B\u0442\u044C \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0430 \u0434\u043B\u044F \u0434\u0435\u0448\u0438\u0444\u0440\u043E\u0432\u0430\u043D\u0438\u044F \u043A\u0430\u043A\u043E\u0433\u043E-\u043B\u0438\u0431\u043E \u0444\u0440\u0430\u0433\u043C\u0435\u043D\u0442\u0430 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F."@ru . "\u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u0430 \u0441\u0442\u0456\u0439\u043A\u0456\u0441\u0442\u044C \u2014 \u0445\u0430\u0440\u0430\u043A\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043A\u0430 \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C \u0432 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0456\u0457. \u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u043E \u0441\u0442\u0456\u0439\u043A\u0438\u043C\u0438 \u0454 \u043A\u0440\u0438\u043F\u0442\u043E\u0441\u0438\u0441\u0442\u0435\u043C\u0438, \u0432 \u043A\u043E\u0442\u0440\u0438\u0445 \u0437 \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442\u0443 \u043C\u043E\u0436\u043D\u0430 \u0432\u0438\u0442\u044F\u0433\u043D\u0443\u0442\u0438 \u043B\u0438\u0448\u0435 \u043D\u0435\u0437\u043D\u0430\u0447\u043D\u0443 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u044E \u043F\u0440\u043E \u0432\u0456\u0434\u043A\u0440\u0438\u0442\u0438\u0439 \u0442\u0435\u043A\u0441\u0442. \u0421\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u0430 \u0441\u0442\u0456\u0439\u043A\u0456\u0441\u0442\u044C \u0454 \u0430\u043D\u0430\u043B\u043E\u0433\u043E\u043C \u043A\u043E\u043D\u0446\u0435\u043F\u0446\u0456\u0457 \u0428\u0435\u043D\u043D\u043E\u043D\u0430. \u0411\u0435\u0437\u0443\u043C\u043E\u0432\u043D\u0430 \u0431\u0435\u0437\u043F\u0435\u043A\u0430 \u043E\u0437\u043D\u0430\u0447\u0430\u0454, \u0449\u043E \u0448\u0438\u0444\u0440\u043E\u0442\u0435\u043A\u0441\u0442 \u043D\u0435 \u0440\u043E\u0437\u043A\u0440\u0438\u0432\u0430\u0454 \u0436\u043E\u0434\u043D\u043E\u0457 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u0457 \u043F\u0440\u043E \u0432\u0456\u0434\u043A\u0440\u0438\u0442\u0438\u0439 \u0442\u0435\u043A\u0441\u0442, \u0442\u043E\u0434\u0456 \u044F\u043A \u0441\u0435\u043C\u0430\u043D\u0442\u0438\u0447\u043D\u0430 \u0441\u0442\u0456\u0439\u043A\u0456\u0441\u0442\u044C \u043F\u0435\u0440\u0435\u0434\u0431\u0430\u0447\u0430\u0454, \u0449\u043E \u0431\u0443\u0434\u044C-\u044F\u043A\u0443 \u0440\u043E\u0437\u043A\u0440\u0438\u0442\u0443 \u0456\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0456\u044E \u043D\u0435\u043C\u043E\u0436\u043B\u0438\u0432\u043E \u0432\u0438\u0442\u044F\u0433\u043D\u0443\u0442\u0438 \u0432\u0438\u043A\u043E\u043D\u0443\u0454\u043C\u0438\u043C \u0447\u0438\u043D\u043E\u043C."@uk . . "In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ciphertext of a certain message (taken from any distribution of messages), and the message's length, cannot determine any partial information on the message with probability non-negligibly higher than all other PPTA's that only have access to the message length (and not the ciphertext). This concept is the computational complexity analogue to Shannon's concept of perfect secrecy. Perfect secrecy means that the ciphertext reveals no information at all about the plaintext, whereas semantic security implies that any information revealed cannot be feasi"@en . .