Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Problem 2 . Committing encryption. A common mistake is to assume that encryption commits the encryptor to the encrypted message. Let ( E , D
Problem Committing encryption. A common mistake is to assume that encryption commits the
encryptor to the encrypted message. Let be a cipher defined over Suppose
Alice chooses some kinK and minM and publishes : This ciphertext is then
stored in a system that prevents any modification to Later, Alice is asked to decrypt this by
revealing her key We say that the encryption scheme is committing if Alice cannot produce a
inK such that where and reject.
a Give a complete game based definition for committing encryption. Your game need only
capture the commitment aspect of the scheme, not confidentiality. Hint: in your game, the
challenger does nothing, and the attacker should output two keys and along with some
other data.
b Let CTR denote counter mode encryption with a random IV with key space Let
be a secure MAC with key space Let be the derived CTRthenMAC cipher
whose key space is We know that provides authenticated encryption. Show
that is not a committing encryption scheme.c Let's show that any cipher can be made to be committing. Recall that in homework # we
defined the concept of a commitment scheme. Such a scheme has a commitment algorithm
commit : used to commit to a key kinK using randomness The scheme
must be hiding and binding. Show that any authenticated encryption cipher defined
over can be converted into a committing encryption scheme defined over
some by using a commitment scheme. Your answer should describe algorithms
and as well as the key space and ciphertext space Briefly explain why your
is committing and provides authenticated encryption.
d We can extend our discussion of committing encryption to publickey encryption. The only
modification to your game based definition from part a is that the adversary must also
output a single public key pk along with the ciphertext and the released secret keys must
be compatible with this pk Show that ElGamal encryption is a committing encryption
scheme.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started