Another method for attaining security against adaptively chosen ciphertext attacks