Cryptography Foundations Solution Exercise 4 4 . 1 The ( In ) security of the ElGamal Public - Key

نویسندگان

  • Ueli Maurer
  • Christian Badertscher
  • Fabio Banfi
چکیده

b) Let RDDH be the system that (when interacting with a distinguisher) outputs a triple (ga, gb, gab) for uniformly distributed a, b ∈ Zq, SDDH the system that outputs (ga, gb, gc) for uniformly distributed a, b, c ∈ Zq, and S ind the system implementing the IND-CPA game for the ElGamal encryption scheme. From a distinguisher D for the bit-guessing problem (S ind, β), we construct a distinguisher D′ for the problem of distinguishing RDDH and SDDH. Upon obtaining a triple (A,B,C), D′ first sends B to D as the public key. When D submits two challenge messages m0 and m1, D ′ chooses a bit β uniformly at random and sends (A,mβ · C) to D. When D issues a bit Z, D′ outputs the bit Z ′ := Z ⊕ β. Note that when D′ interacts with RDDH, it perfectly emulates S ind towards D. Assume D′ interacts with SDDH; in this case, (A,B,C) are uniform and independent, and therefore mβ ·C is distributed uniformly by Exercise 1.2. Moreover, A, B, and mβ ·C are independent since

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

Strong Cryptography from Weak Secrets Building Efficient PKE and IBE from Distributed Passwords

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the D...

متن کامل

Building Efficient PKE and IBE from Distributed Passwords

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the D...

متن کامل

Semantically Secure Anonymity: Foundations of Re-encryption

The notion of universal re-encryption is an established primitive used in the design of many anonymity protocols. It allows anyone to randomize a ciphertext without changing its size, without decrypting it, and without knowing the receiver’s public key. By design it prevents the randomized ciphertext from being correlated with the original ciphertext. We revisit and analyze the security foundat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018