Mathematically, a cryptosystem or encryption scheme can be defined as a tuple ( P , C , K , E , D ) {\displaystyle ({\mathcal {P}},{\mathcal {C}},{\mathcal {K}},{\mathcal {E}},{\mathcal {D}})} with the following properties.
For each e ∈ K {\displaystyle e\in {\mathcal {K}}} , there is d ∈ K {\displaystyle d\in {\mathcal {K}}} such that D d ( E e ( p ) ) = p {\displaystyle D_{d}(E_{e}(p))=p} for all p ∈ P {\displaystyle p\in {\mathcal {P}}} .2
Note; typically this definition is modified in order to distinguish an encryption scheme as being either a symmetric-key or public-key type of cryptosystem.
A classical example of a cryptosystem is the Caesar cipher. A more contemporary example is the RSA cryptosystem.
Another example of a cryptosystem is the Advanced Encryption Standard (AES). AES is a widely used symmetric encryption algorithm that has become the standard for securing data in various applications.
Paillier cryptosystem is another example used to preserve and maintain privacy and sensitive information. It is featured in electronic voting, electronic lotteries and electronic auctions.3
Menezes, A.; Oorschot, P. van; Vanstone, S. (1997). Handbook of Applied Cryptography (5th ed.). CRC Press. ISBN 0-8493-8523-7. 0-8493-8523-7 ↩
Buchmann, Johannes A. (13 July 2004). Introduction to Cryptography (2nd ed.). Springer. ISBN 0-387-20756-2. 0-387-20756-2 ↩
Xia, Zhe; Yang, Xiaoyun; Xiao, Min; He, Debiao (2016). "Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry". In Liu, Joseph K.; Steinfeld, Ron (eds.). Information Security and Privacy. Lecture Notes in Computer Science. Vol. 9723. Cham: Springer International Publishing. pp. 73–86. doi:10.1007/978-3-319-40367-0_5. ISBN 978-3-319-40367-0. 978-3-319-40367-0 ↩