the past, each new scheme came with its own definition of security, which makes them hard
to compare. We thus define a set of notions, as done for signature and encryption, for which
we prove implications and separations, and relate the existing notions to the ones in our
framework. We find some interesting relationships between the various notions, especially in
the way they define the receiver set of the challenge message. In addition, we define a …