Design a new public key encryption scheme

Assignment Help Computer Network Security
Reference no: EM13708423

Consider two public key encryption schemes, an inner scheme Π = (gen, enc, dec), and an outer scheme Π' = (gen', enc', dec'), where λ is the security parameter. We say Π and Π' are compatible if the plaintext space of the outer scheme Π' is identical to the ciphertext space of the inner scheme Π. Based on the compatible schemes Π and Π', we may use the inner scheme to encrypt some data, and then use the outer scheme to encrypt the encrypted data further. Formally, we design a new public key encryption scheme II = (Gen, Enc,Dec) as follows.

The key generation algorithm (PK, SK) ← Gen(1λ):

- Compute (pk, sk) ← gen(1λ)
- Compute (pk', sk') ← gen'(1λ)
- Set PK := (pk, pk') and SK := (sk, sk')

 The encryption algorithm C ← EncPK(m):
- Compute c ←  encpk(m)
- Compute C  ← enc'pk'(c)

 The decryption algorithm m' ← DecSK(C):
- Compute c' ← dec'sk'(C)
- Compute m ←  decsk (c)

Assume all schemes Π, Π' and II are correct. We here intend to investigate the security of the new scheme II. Please choose one of the following two problems, and provide your solutions. If you believe the new scheme is secure, then you are supposed to provide a clear reduction proof by using proper notations. If you believe it is insecure, then you are supposed to give a counter-example, or at least provide convincing argument that the scheme is insecure.

1. Please de ne and then show the correctness of the new scheme II.

2. If both Π and Π' are CPA-secure, then will the new scheme II be CPA-secure? If so, please prove it. If not, please disprove it.

3. If both Π and Π' are CCA-secure, then will the new scheme II be CCA-secure? If so, please prove it. If not, please disprove it.

4. If the inner scheme Π is CPA-secure while the outer scheme Π' is CCA-secure, then will the new scheme II be CCA-secure? If so, please prove it. If not, please disprove it.

5. If the inner scheme Π is CCA-secure while the outer scheme Π' is CPA-secure, then will the new scheme II be CCA-secure? If so, please prove it. If not, please disprove it.

Reference no: EM13708423

Questions Cloud

Find the time until the rock : At the edge of a 12- m-tall building, two children throw rocks at 12 m/ s, one upward and one downward. Find the time until the rock
Estimate what the resistor voltage : A series combination has a battery (V = 18V), a switch (initially open), a resistor (R = 450 ), and a capacitor (C = 22.0 F). Calculate the resistor voltage after two time constants have elapsed
Evaluate the power dissipated by the external resistor : A battery with an Emf of 22.0 V has an internal resistance of r. It is connected to an external resistance of 280. Determine the power dissipated by the external resistor
Find the ratio of the periods of the satellites : Two satellites, A and B, are in different circular orbits about the earth. The orbital speed of satellite A is twenty-eight times that of satellite B. Find the ratio (TA/TB) of the periods of the satellites
Design a new public key encryption scheme : Design a new public key encryption scheme - de ne and then show the correctness of the new scheme II.
What would you expect to happen : If you charged a capacitor with a 3V battery and then switch the battery out for a 6V battery, what would you expect to happen
What amount of electric charge : An electric field of 10000 N/C is measured 2.0 cm away from the surface of a conducting sphere of 1.0 cm radius. What amount of electric charge
Where specifically must the satellite be placed : A geostationary satellite is one whose orbit is fixed with respect to the rotating Earth. Where specifically must the satellite be placed
What is the initial vertical velocity component : If a ball travels at 12 m/s at an angle of 55 degrees above the horizontal,  What is the initial vertical velocity component

Reviews

Write a Review

Computer Network Security Questions & Answers

  How can the trusted boot functions prevent the unauthorized

Why would IBM be an advocate for open standards? Why would it change its proprietary ESS 1.0 chip—which it had already sold in some ofits PL300 desktops and T23 ThinkPad notebooks,and which it had paid a Common Criteria Testing Laboratory to evaluate..

  Configuring dhcp with alternate ip address configuration

By configuring DHCP with an Alternate IP Address Configuration. Describe how this technique could be used in an IT environment of your choosing.

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  What issues can arise during admission of digital evidence

The DQ response should be between 500 words, and grammar and spelling are important. Please make sure to proofread carefully!

  Geen computing is the study and practice of ecofriendly

1 green computing is the study and practice of ecofriendly computing resources. green computing is often seen

  Define the terms class, object and message

Define the terms class, object and message. How does the concept of message passing help to encapsulate the implementation of an object, including its data?

  Verify the correctness of your decryption

In a public-key system using RSA, you intercept the ciphertext C = 13 sent to a user whose public key is e = 23, n = 143. What is the plaintext M?

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd