Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Secret Sharing is an important class of protocols in cryptography. In this problem we take a look at some simple implementations using SS ciphers.

Secret Sharing is an important class of protocols in cryptography. In this problem we take a look at some simple implementations using SS ciphers. a) We start with the case of 2 parties who want to be able to decrypt a ciphertext only if they are both present and not individually. Think of the following protocol. A random member of the key-space (bit-strings) re K is picked. Two keys are generated ka = r and kb = r ka. Now if encryption is done using r both parties must be present to compute kak, for decryption. Show that the advantage of an attacker in breaking the semantic security of E(r, m) given k is related to the semantic security advantage of breaking E in general. b) We can then do the same for 2-out-of-3. We have 3 parties and we want any 2 of them to be able to decrypt. Think of the following approach. We randomly pick (ko, k) and (ko, k) that fit the equations kok = k k = k. How should we distribute the 4 ki, ki among 3 parties to make it such that no one party can learn but any 2 parties can learn k? c) We now implement this key splitting scheme with encryption in a way so that the construction of k on a single machine is not necessary. Using semantically secure E we build the following encryption over 4 keys (ko, k, k2, k3) K4: c (E(k, E(ko, m)), E(k3, E(k2, m))) How should we distribute the 4 keys to allow for 2-out-of-3?

Step by Step Solution

3.45 Rating (155 Votes )

There are 3 Steps involved in it

Step: 1

a The advantage of an attacker in breaking the semantic security of Erm given k ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Cost Management Measuring Monitoring And Motivating Performance

Authors: Leslie G. Eldenburg, Susan Wolcott, Liang Hsuan Chen, Gail Cook

2nd Canadian Edition

1118168879, 9781118168875

More Books

Students also viewed these Accounting questions

Question

identify the classifications of interventions;

Answered: 1 week ago