Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Let F:{0,1}n{0,1}n{0,1}n be a length-preserving pseudorandom function and a{0,1}n be a fixed n-bit string known to both Alice and Bob. They construct a private-key encryption
Let F:{0,1}n{0,1}n{0,1}n be a length-preserving pseudorandom function and a{0,1}n be a fixed n-bit string known to both Alice and Bob. They construct a private-key encryption scheme as follows. Gen: On input 1n, output a uniformly chosen key k of length n, i.e., output k{0,1}n. Enc: To encrypt a given message m{0,1}n, Alice computes Fk(a) and outputs the ciphertext as c=mFk(a). (a) Show Bob how to decrypt in the scheme . (b) Does the scheme have indistinguishable encryptions in the presence of an eavesdropper? Prove your answer. (c) Is the scheme CPA-secure? Prove your
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started