Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 2 . Committing encryption. A common mistake is to assume that encryption commits the encryptor to the encrypted message. Let ( E , D

Problem 2. Committing encryption. A common mistake is to assume that encryption commits the encryptor to the encrypted message. Let (E,D) be a cipher defined over (K,M,C). Suppose Alice chooses some k in K and m in M and publishes c := E(k,m). This ciphertext c is then stored in a system that prevents any modification to c. Later, Alice is asked to decrypt this c by revealing her key k. We say that the encryption scheme is committing if Alice cannot produce a k in K such that D(k,c)= m where m= m and m= reject.
a. Give a complete game based definition for committing encryption. Your game need only capture the commitment aspect of the scheme, not confidentiality. Hint: in your game, the challenger does nothing, and the attacker should output two keys k and k, along with some other data.
b. Let CTR denote counter mode encryption with a random IV, with key space Ke. Let (S, V ) be a secure MAC with key space Km. Let (E,D) be the derived CTR-then-MAC cipher whosekeyspaceisKe\times Km. Weknowthat(E,D)providesauthenticatedencryption. Show that (E,D) is not a committing encryption scheme.
Problem 2. Committing encryption. A common mistake is to assume that encryption commits the encryptor to the encrypted message. Let (E,D) be a cipher defined over (K,M,C). Suppose Alice chooses some k in K and m in M and publishes c := E(k,m). This ciphertext c is then stored in a system that prevents any modification to c. Later, Alice is asked to decrypt this c by revealing her key k. We say that the encryption scheme is committing if Alice cannot produce a k in K such that D(k,c)= m where m= m and m= reject.
a. Give a complete game based definition for committing encryption. Your game need only capture the commitment aspect of the scheme, not confidentiality. Hint: in your game, the challenger does nothing, and the attacker should output two keys k and k, along with some other data.
b. Let CTR denote counter mode encryption with a random IV, with key space Ke. Let (S, V ) be a secure MAC with key space Km. Let (E,D) be the derived CTR-then-MAC cipher whosekeyspaceisKe\times Km. Weknowthat(E,D)providesauthenticatedencryption. Show that (E,D) is not a committing encryption scheme.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Discuss effective techniques for reducing stage fright.

Answered: 1 week ago

Question

1. Explain how business strategy affects HR strategy.

Answered: 1 week ago