Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Bad Proof. We want to prove that if G ( ) is a secure PRG , then is a secure encryp - tion scheme under

Bad Proof. We want to prove that if G() is a secure PRG, then is a secure encryp-
tion scheme under the EAV security definition. We will do a proof by contradiction
so we first state the contrapositive statement:
If is not a secure EAV encryption scheme, G() is not a secure PRG.
To prove the contrapositive, we begin by assuming that is not a secure EAV en-
cryption scheme, thus, there exists an adversary A that breaks the EAV security of
II with non-negligible advantage, i.e.
Pr[A breaks EAV of]=12+p(n),
where p(n) is a non-negligible value.
Then, using A we construct an distinguisher D that breaks the security of G().
D is given as input a string w of size 2n from its challenger.
D starts running A.
When A sends m0,m1 to D,D will first flip a bit bin{0,1}, encrypt mb as
follows: c**=mb,Lo+w||mb,Ro+w and send c** to A.
A outputs a bit b'.
If b'=b then D outputs 1(i.e. claims that w was the output of a PRG), else
D outputs 0.
Analysis. We consider 2 cases:
Suppose w was a truly random string, then
Pr[A breaks EAV of]=12
and thus Pr[D(r)=1]=12.
Suppose w was the output of a PRG, then (by assumption)
Pr[A breaks EAV of]=12+p(n),
and thus Pr[D(G(s))=1]=12+p(n).
Thus,
|Pr[D(G(s))=1]-Pr[D(r)=1]|=|12+p(n)-12|=p(n)
and since p(n) is a non-negligible value, D is a good distinguisher for G(), i.e. broke
the security of the PRG G().
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MFDBS 91 3rd Symposium On Mathematical Fundamentals Of Database And Knowledge Base Systems Rostock Germany May 6 9 1991

Authors: Bernhard Thalheim ,Janos Demetrovics ,Hans-Detlef Gerhardt

1991st Edition

3540540091, 978-3540540090

Students also viewed these Databases questions

Question

What is the job being performed?

Answered: 1 week ago

Question

1. Define mass and mediated communication

Answered: 1 week ago