Design a new public key encryption scheme

Assignment Help Computer Network Security
Reference no: EM13708423

Consider two public key encryption schemes, an inner scheme Π = (gen, enc, dec), and an outer scheme Π' = (gen', enc', dec'), where λ is the security parameter. We say Π and Π' are compatible if the plaintext space of the outer scheme Π' is identical to the ciphertext space of the inner scheme Π. Based on the compatible schemes Π and Π', we may use the inner scheme to encrypt some data, and then use the outer scheme to encrypt the encrypted data further. Formally, we design a new public key encryption scheme II = (Gen, Enc,Dec) as follows.

The key generation algorithm (PK, SK) ← Gen(1λ):

- Compute (pk, sk) ← gen(1λ)
- Compute (pk', sk') ← gen'(1λ)
- Set PK := (pk, pk') and SK := (sk, sk')

 The encryption algorithm C ← EncPK(m):
- Compute c ←  encpk(m)
- Compute C  ← enc'pk'(c)

 The decryption algorithm m' ← DecSK(C):
- Compute c' ← dec'sk'(C)
- Compute m ←  decsk (c)

Assume all schemes Π, Π' and II are correct. We here intend to investigate the security of the new scheme II. Please choose one of the following two problems, and provide your solutions. If you believe the new scheme is secure, then you are supposed to provide a clear reduction proof by using proper notations. If you believe it is insecure, then you are supposed to give a counter-example, or at least provide convincing argument that the scheme is insecure.

1. Please de ne and then show the correctness of the new scheme II.

2. If both Π and Π' are CPA-secure, then will the new scheme II be CPA-secure? If so, please prove it. If not, please disprove it.

3. If both Π and Π' are CCA-secure, then will the new scheme II be CCA-secure? If so, please prove it. If not, please disprove it.

4. If the inner scheme Π is CPA-secure while the outer scheme Π' is CCA-secure, then will the new scheme II be CCA-secure? If so, please prove it. If not, please disprove it.

5. If the inner scheme Π is CCA-secure while the outer scheme Π' is CPA-secure, then will the new scheme II be CCA-secure? If so, please prove it. If not, please disprove it.

Reference no: EM13708423

Questions Cloud

Find the time until the rock : At the edge of a 12- m-tall building, two children throw rocks at 12 m/ s, one upward and one downward. Find the time until the rock
Estimate what the resistor voltage : A series combination has a battery (V = 18V), a switch (initially open), a resistor (R = 450 ), and a capacitor (C = 22.0 F). Calculate the resistor voltage after two time constants have elapsed
Evaluate the power dissipated by the external resistor : A battery with an Emf of 22.0 V has an internal resistance of r. It is connected to an external resistance of 280. Determine the power dissipated by the external resistor
Find the ratio of the periods of the satellites : Two satellites, A and B, are in different circular orbits about the earth. The orbital speed of satellite A is twenty-eight times that of satellite B. Find the ratio (TA/TB) of the periods of the satellites
Design a new public key encryption scheme : Design a new public key encryption scheme - de ne and then show the correctness of the new scheme II.
What would you expect to happen : If you charged a capacitor with a 3V battery and then switch the battery out for a 6V battery, what would you expect to happen
What amount of electric charge : An electric field of 10000 N/C is measured 2.0 cm away from the surface of a conducting sphere of 1.0 cm radius. What amount of electric charge
Where specifically must the satellite be placed : A geostationary satellite is one whose orbit is fixed with respect to the rotating Earth. Where specifically must the satellite be placed
What is the initial vertical velocity component : If a ball travels at 12 m/s at an angle of 55 degrees above the horizontal,  What is the initial vertical velocity component

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is a honeypot

How has honeypots been used in the field of national security?

  Describe some typical devices or assets

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Decisions on any changes that materially affect project

It has been recommended in some quarters that for large projects, decisions on any changes that materially affect assignment milestones

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

  How do these standards reflect a changed environment

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

  You have been hired as the system administrator for msp llc

desktop migration proposalyou have been hired as system administrator for msp llc. your first task involves in

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  What are the benefits of virtualization of servers

What are the benefits of virtualization of servers? Short answer - Need at least 4 benefits. Also define a virtual server.

  Perform an attack against the cipher

Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd