Encryrption of some unknown

Assignment Help Basic Computer Science
Reference no: EM13162720

Consider the following modification of the El Gamal encryption scheme over the group Z_p. The public key is

 

y = g^x mod p and the secret key is x where x is random in {0, . . . , p ? 1}. To encrypt a message m, one

 

chooses a random number r and sends c = (g^r mod p, y^r g^m mod p).

 

(a) Show how the receiver (who knows x) can recover g^m mod p from the ciphertext.

 

(b) Assuming the discrete logarithm problem is hard in Z_p, recovering g^m mod p, in general, will not allow

 

the recipient to recover m. Argue, however, that if we assume that the sender only sends messages in the

 

range {0, . . . , 100}, then the receiver can recover m.

 

(c) Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid

 

encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2

 

mod p,B1B2 mod p) an encryption of?

 

(d) Assume the receiver R is conducting an auction in which two bidders each encrypt their bids using the

 

scheme above and send them to R. Assume also that both bidders can semd at most $100, so that R can

 

decrypt as in part b. Argue that the bidder who goes second can always bid $1 more than the first bidder,

 

without ever knowing the bid value of the first bidder.

Reference no: EM13162720

Questions Cloud

Write a program which accepts the total of food and drink : Write a program which accepts the total of food and drink purchased for a restaurant bill as input. The output should be adjusted bill with a sales tax of six percent 6% and a tip (gratuity) of 15%.
Write the class definition for a class called complex : . Write the class definition for a class called complex.
Dealerships are awarded the rebate : Dealerships are awarded the rebate on a quarter-by-quarter basis, only for quarters where their actual sales exceeded expected volumes for that quarter. Expected sales volumes for each quarter are as follows:
B+-tree : For the B+-tree where M=3 and L=5 shown below, show how an insert of value 80 is handled.
Encryrption of some unknown : Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid  encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2  mod p,B1B2 mod p) an encryption of?
Problem resolution in an organization. : In a one to two page (two page double-spaced maximum) paper explain why information systems today are currently effective or ineffective in assisting with problem resolution in an organization.
Design a calculator in assembly : Design a calculator in assembly that can handle +,-,/,%, * and expresses errors in the case of division by zero or invalid characters using the template below.
Display the customerid from the orders table : Display the CustomerID from the Orders table and the sum of the associated ItemPrice multiplied by Quantity using Gross Sales (with a space) as the column name from the OrderItems table.
Display all the lastnames from the customers table : Display all the LastNames from the Customers table and any associated OrdersIDs from the Orders Table. Show the LastName even if they do not have any associated orders. Order the results by LastName in ascending order.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Process centered organization differ from task-centered one

According to Hammer, how does a process centered organization differ from a task-centered one? What are the pros and cons of either approach?

  Write down differences in company policies of firm

For Firm ABC, each of the relations is in 3NF. Write down two differences should exist in company policies of Firm ABC? Explain your answer.

  Impact of activities called ping sweeps and port scans

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what the impact of these activities might be on your company.

  Up-to-the-minute information effective for medical industry

Up-to-the-minute information to clinicians in visually rich format to improve quality of patient care" do you believe this is the effective for medical industry to view this kind of information? Why or why not?

  Merging transaction and analytical processing problem occurs

When merging transaction and analytical processing a problem occurs. Real-time analytical processing diminishes the performance of transaction processing. What is the solution to this problem that many companies use?

  Explain daytime processing load

Assume daytime processing load consists of 60% CPU activityand 40% disk activity. Your customers are complaining that the system is slow. Which would you select to yield best performance improvement for least amount of money?

  Explain how company wants corporation-s business

The company is willing to pay $30,000 for the hardware and the software together and wants the complete software product in 4 weeks. What do you tell him? Bear in mind that your company wants his corporation's business, no matter how unreasona..

  Determining accurate formula using undetermined coefficients

Determine a more accurate formula for f'(t) using method of undetermined coefficients. Let's say the formula is of the form f'(t)= Af(t + 2h) + Bf(t + h) - Bf(t - h) - Af(t - 2h).

  Describe basic computer system and typical components

Describing the basic computer system and the typical components that perform input, output, processing, storage, and control functions.

  Describe method to execute account harvesting

Describe the threat of account harvesting. Suggest a method to execute an account harvesting attack on a Windows platform.

  Explain components of information systems

Using the three components of information systems and the complementary assets concepts, discuss why some companies achieve better results with information systems than others.

  How virtual memory relies on locality of reference principle

TLB entries are different than page table entries. Describehow they differ and why they differ. Virtual memory relies on a locality of reference principle. Describe.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd