Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 1 : On leaking, or hiding, the message length Consider encryption scheme Gen, Enc, Dec ) that is EAV - secure w . r

Problem 1: On leaking, or hiding, the message length
Consider encryption scheme Gen, Enc, Dec) that is EAV-secure w.r.t. the definition in Figure 1.
Figure 1: Indistinguishability of encryptions in the presence of an eavesdropper.
(1) What does the condition |m0|=|m1| capture? Does it weaken or strengthen 's security?
(2) Let PrivK-EAV 2A,'(n) be the game in Figure 1 where A is allowed to choose challenge messages
of arbitrary length for breaking encryption scheme '=(Gen',Enc',Dec'), and consider the security
notion derived by this modified game: Intuitively, ' is EAV2-secure, if no efficient A can determine
cb better than guessing, even when |m0||m1|. Show that no EAV2-secure scheme ' exists.
Hint: First, note that ' is defined over message space M={0,1}**, i.e., messages of
arbitrary length. Then, assume that polynomial p(n) is an upper bound on the time
spent by Enc' for encrypting a single bit, and consider what happens when A chooses
m0in{0,1} and a random m1in{0,1}p(n)+c, where c1 a positive integer.
(3) Show that EAV2-security can be achieved by encryption schemes defined over messages up to
a given maximum length, i.e., by schemes ' such that for kin{0,1}n, algorithm Enck' is defined
over message space M'={m:|m|l}, where ll(n) for some given polynomial l(*).
Hint: Construct a scheme '=(Gen',Enc',Dece') that encrypts messages in M' by
employing a EAV-secure scheme Gen, Enc, Dec) with message space M. Consider
an algorithm Enc ?' that on input message m'inM', merely applies Enc on a unique
and inversible encoding m=E(m')inM of m' in a way that "compensates" for the
absence of the restriction |m0|=|m1| in game PrivK-EAV2A,'(n). Then, prove that '
is EAV2-secure via a proof by reduction.
***** Please answer question number 3
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Fundamentals Study Guide

Authors: Dr. Sergio Pisano

1st Edition

B09K1WW84J, 979-8985115307

Students also viewed these Databases questions

Question

Describe how simulated test marketing works.

Answered: 1 week ago