Cryptanalytic attack model where the attacker gathers information by obtaining the decryptions of chosen ciphertexts.