Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 2 . Committing encryption. A common mistake is to assume that encryption commits the encryptor to the encrypted message. Let ( E , D

Problem 2. Committing encryption. A common mistake is to assume that encryption commits the
encryptor to the encrypted message. Let (E,D) be a cipher defined over (K,M,C). Suppose
Alice chooses some kinK and minM and publishes c:=E(k,m). This ciphertext c is then
stored in a system that prevents any modification to c. Later, Alice is asked to decrypt this c by
revealing her key k. We say that the encryption scheme is committing if Alice cannot produce a
k'inK such that D(k',c)=m' where m'm and m' reject.
a. Give a complete game based definition for committing encryption. Your game need only
capture the commitment aspect of the scheme, not confidentiality. Hint: in your game, the
challenger does nothing, and the attacker should output two keys k and k', along with some
other data.
b. Let CTR denote counter mode encryption with a random IV, with key space Ke. Let (S,V)
be a secure MAC with key space Km. Let (E',D') be the derived CTR-then-MAC cipher
whose key space is KeKm. We know that (E',D') provides authenticated encryption. Show
that (E',D') is not a committing encryption scheme.c. Let's show that any cipher can be made to be committing. Recall that in homework #3 we
defined the concept of a commitment scheme. Such a scheme has a commitment algorithm
commit : KRCcom used to commit to a key kinK using randomness rlarrRR. The scheme
must be hiding and binding. Show that any authenticated encryption cipher (E,D) defined
over (K,M,C) can be converted into a committing encryption scheme (E',D') defined over
some (K',M,C') by using a commitment scheme. Your answer should describe algorithms E'
and D' as well as the key space K' and ciphertext space C'. Briefly explain why your (E',D')
is committing and provides authenticated encryption.
d. We can extend our discussion of committing encryption to public-key encryption. The only
modification to your game based definition from part (a) is that the adversary must also
output a single public key pk along with the ciphertext c, and the released secret keys must
be compatible with this pk. Show that ElGamal encryption is a committing encryption
scheme.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Spatial Databases 2nd Symposium Ssd 91 Zurich Switzerland August 1991 Proceedings Lncs 525

Authors: Oliver Gunther ,Hans-Jorg Schek

1st Edition

3540544143, 978-3540544142

More Books

Students also viewed these Databases questions

Question

Explain Telehealth legal issues, regulations and laws

Answered: 1 week ago