
Or I could say that two cryptosystems are confidentiality-equivalent, in which case the objects help achieve the security goal. In this case, I’m discussing objects which, if treated improperly, could lead to a compromise of the security goal of confidentiality.

I consider two objects to be security equivalent if they are identical with respect to the security properties under discussion for precision, I may refer to confidentiality-equivalent pieces of information if the sets of parties to which they may be disclosed (without violating security) are exactly the same (and conversely, so are the sets of parties to which they may not be disclosed).
