Lecture 17 : Constructions of Public - Key Encryption

نویسنده

  • Rafael Pass
چکیده

In the previous lecture, we defined Public-Key Encryption system. We now proceed to define security in these systems. Intuitively, we would like the encryptions of different messages to be indistinguishable, even when the public key is known by the adversary. be a Public-Key Encryption system over the message space M. (Gen, Enc, Dec) is said to be secure, if for all p.p.t. A there exists a negligible function ǫ(n) such that, ∀m 0 , m 1 ∈ M, |m 0 | = |m 1 | = n it holds that P r[(pk, sk) ← Gen(1 k) : A(pk, Enc pk (m 0)) = 1] − P r[(pk, sk) ← Gen(1 k) : A(pk, Enc pk (m 1)) = 1] < ǫ(k) Theorem 1 If One-Way Trapdoor permutations exist, we can construct 1-bit secure Public-Key Encryption system. Proof: In Lecture 11, it was shown that if OWP exist, then we can construct a OWP with a hard-core bit. Therefore, (f i , t i) i∈I be a family of One-Way trapdoor permutation and let b i be the hard-core bit corresponding to f i. Let Gen T DP be the p.p.t that samples from I. We construct a Public-Key Encryption as follows. The message space M = {0, 1}.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions

We address the problems of whether t-circular-secure encryption can be based on (t − 1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based on CPA-secure encryption, can be used to build a 1-circular-secure encryption with the same secret-key and message space, no such constructions are known for the bit-encryption case, which is of...

متن کامل

Lecture 8 : Public - Key Encryption

In the previous lecture, we discussed the concept of Secret-Key Encryption. However, this scheme has a major limitation in the fact that the key has to be shared between the sender and the receiver before any message can be transmitted. There might be several cases where doing this is infeasible if there has been no prior communication between the sender and the receiver. In today’s lecture, we...

متن کامل

Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting

We present a new class of public-key predicate encryption schemes that are provably function private in the standard model under well-known cryptographic assumptions, and assume predicate distributions satisfying realistic min-entropy requirements. More concretely, we present public-key constructions for identity-based encryption (IBE) and inner-product encryption (IPE) that are computationally...

متن کامل

K — Advanced Topics in Cryptography February 5 , 2004 Lecture 4

The focus of this lecture is efficient public-key encryption. In the previous lecture, we discussed a public-key encryption scheme for 1-bit messages. However, to encrypt an `-bit message, we can simply encrypt ` one-bit messages and send these (and we proved last time that this remains secure in the case of public-key encryption). Here, we first describe (briefly) how to combine public and pri...

متن کامل

Lecture 2 : Optimality of One - time MACs and Shannon Impossibility

Today we conclude with our study with one-time message authentication codes. In Lecture 1, we defined one-time secure MACs and constructed these MACs using δ − AXU functions. Furthermore, we showed that the security of this construction lost security exponentially with as the min-entropy of the key decreased. We show that the constructions achieved in Lecture 1 were essentially tight. We will d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006