Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Problem 3 . ElGamal tricks. Bob's corporate mail server publishes a public - key p k b o b so that all incoming emails to

Problem 3. ElGamal tricks. Bob's corporate mail server publishes a public-key pkbob so that all
incoming emails to Bob are encrypted under pkbob. When Bob goes on vacation he instructs the
company's mail server to forward all his incoming email to his colleague Alice. Alice's public key
is pkalice. The mail server needs a way to translate an email encrypted under public-key pkbob
into an email encrypted under public-key pkalice. This would be easy if the mail server had sk bbob,,
but then the mail server could read all of Bob's incoming email, which is undesirable.
Let G be a group of prime order q with generator ginG. Consider a minor variation of the
ElGamal encryption scheme from lecture where encryption using a public key pk :=u=ginG
works as follows:
E(pk,m)={larrZq,vlarrg,klarrH(u),clarrEsym(k,m), output (v,c)}.
Here Esym is the encryption algorithm of a symmetric cipher with key space Ksym, and H is a
hash function H:GKsym.
Suppose that pkbob and pkalice are public keys for this scheme with corresponding secret keys
skbob=inZq and skalice='inZq. To enable private translation of ciphertexts from pkbob to
pkalice, Alice and Bob get together to compute :='inZq. They give to the mail server.
a. Explain how the mail server uses to translate a ciphertext clarrRE(pkbob,m) to a ciphertext
c' for pkalice for the same message m. Justify your answer.b. Show that can also be used to translate in the other direction. That is, if clarrRE(pkalice,m)
then the mail server can construct a ciphertext c' for pkbob for the same message m.
Note that this is an unintended consequence that Alice did not want. It is not difficult to
modify the scheme to prevent this unintended feature, but we will not do that here.
c. Show that if the mail server could use to decrypt messages for Bob, then this would lead
to a total break of this ElGamal encryption scheme. That is, suppose there is an efficient
adversary A that given ({:pkbob,pkalice,,clarrR?-E(pkbob,m)) as input, outputs m. Show
that there is an efficient adversary B that uses A to break semantic security of this ElGamal
scheme (without knowledge of ).
d. When Bob comes back from vacation, what should he do to make sure that Alice can no
longer read his emails?
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2022 Grenoble France September 19 23 2022 Proceedings Part 4 Lnai 13716

Authors: Massih-Reza Amini ,Stephane Canu ,Asja Fischer ,Tias Guns ,Petra Kralj Novak ,Grigorios Tsoumakas

1st Edition

3031264118, 978-3031264115

More Books

Students also viewed these Databases questions