interactive form of chosen-ciphertext attack in which an attacker first sends some ciphertexts to be decrypted chosen adaptively and then uses the results to distinguish a target ciphertext without consulting the oracle on the challenge ciphertext