Receiver r is conducting an auction

Assignment Help Basic Computer Science
Reference no: EM13162695

 

Consider the following modification of the El Gamal encryption scheme over the group Z_p. The public key is

y = g^x mod p and the secret key is x where x is random in {0, . . . , p ? 1}. To encrypt a message m, one

chooses a random number r and sends c = (g^r mod p, y^r g^m mod p).

(a) Show how the receiver (who knows x) can recover g^m mod p from the ciphertext.

(b) Assuming the discrete logarithm problem is hard in Z_p, recovering g^m mod p, in general, will not allow

the recipient to recover m. Argue, however, that if we assume that the sender only sends messages in the

range {0, . . . , 100}, then the receiver can recover m.

(c) Assume (A1,B1) is an encryrption of some unknown m1. Prove that (A1,B2g^(m2) mod p) is a valid

encryption of m1 + m2 mod p. More generally, if (A2,B2) is an encryption of m2, what is (A1A2

mod p,B1B2 mod p) an encryption of?

(d) Assume the receiver R is conducting an auction in which two bidders each encrypt their bids using the

scheme above and send them to R. Assume also that both bidders can semd at most $100, so that R can

decrypt as in part b. Argue that the bidder who goes second can always bid $1 more than the first bidder,

without ever knowing the bid value of the first bidder.

 

 

Reference no: EM13162695

Questions Cloud

Control that programmee with key : Please control that programmee with key (left ,right ,up and down ) and also make a chain of snake when eat egg,and game over when snake strike with hurdel.
We wish to process survey results : Suppose we wish to process survey results that are stored in a file. This exercise requires twoseparate programs. First, create a program that prompts the user for survey responses and outputseach response to a file
Given a 3 millisecond seek time : Given a 3 millisecond seek time for a disk drive and assuming that once you reach the starting track you will write the file as contiguous sectors, how long will it take to write a 1 megabyte file? The disk rotates at 7200 rpm and each sector hold 1 ..
User enters a negative number or a nondigit number : If the user enters a negative number or a nondigit number, throw and handle an appropriate exception and prompt the user to enter another nonnegative number.
Receiver r is conducting an auction : Assume the receiver R is conducting an auction in which two bidders each encrypt their bids using the scheme above and send them to R.
Hash function h is used and the signature : Suppose a hash function h is used and the signature must be valid for h(m) instead of m. Explain how  this scheme protects against existential forgery
Bob''s encryption company : Suppose Bob's encryption company produces two machines, A and B, both of this are supposed to be implemen- tations of RSA using the same modulus n = pq for some unknown primes p and q
Difference between cyber crimes and cyber-related crimes. : Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.
Draw a production system : Suppose that you must perform three tasks, X, Y, and Z. You can only do one task at a time, and once that task is done, you never redo it.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain main points to write in the communications plan

Recognize the main points you would write in the communications plan at this point in project. What suggestions would you give your project team to aid it manage user expectations?

  Significance of strategic management

Explain the significance of strategic management to support telecommunications planning model.

  What influence the concept of pervasive computing

What you believe the eventually influence will be of concept of "pervasive computing" or"location based services" will be on society.

  Sequence of events necessary to establish communication

Multiple KDC Domains to chain of three KDC. In other words, suppose that Alice wants to talk to Boris through a chain of 3 KDCs. Provide sequence of events necessary to establish communication.

  Explain object-oriented analysis and agile methodologies

Distinguish the object-oriented analysis and create models with structured analysis and design models. Write down Agile Methodologies?

  E-commerce web site

Final project will be a Java programming project that uses design patterns to help form a dynamic Web database application. Final Project:  e-commerce Web Site

  Use electronic monitoring to measure employee productivity

A discussion of the current trend to use electronic monitoring to measure employee productivity, bearing in mind the theories of Taylor and McGregor. The key ethical issues and the stakeholders involved.

  Examine graph which compares segment sequence numbers

Why does Segment Sequence Number remain unchanged (indicated by the horizontal line in graphs) with every drop in congestion window?

  Determine subgame-perfect equilibrium

Targeting again one of the surviving gangsters. Survivors split money equally. Determine subgame-perfect equilibrium.

  Cores on computer systems

Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency,

  Explaining logical knowledge base represents the world

A logical knowledge base represents the world using a set of sentences with no explicit structure. Analogical representation, on the other hand, has physical structure that corresponds.

  Examine amazon using competitive forces-value chain models

Examine Amazon.com using competitive forces and value chain models. How has it replied to pressures from its competitive environment?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd