Consider the following protocol for two parties A and B to flip a fair coin (more...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider the following protocol for two parties A and B to flip a fair coin (more complicated versions of this might be used for internet gambling): (1.) a trusted party T publishes a public key pk (from a public-key encryption scheme); (2.) A chooses a uniform random bit b, encrypts it using pk, and announces the ciphertext CA; (3.) next, B (similarly) chooses a uniform random bit bB, encrypts it using pk, and announces the ciphertext CB; (4.) T decrypts both b and bB, and announces the results; the parties XOR the results to obtain the value of the coin. (a) Argue that even if A is dishonest (but B is honest), the final value of the "coin toss" is uniformly distributed. (b) Assume that the parties use El Gamal encryption (where the bit b is encoded as the group element gb before being encrypted-note that efficient decryption is still possible). Show how a dishonest B can bias the resulting coin to be any value she likes. (c) This is a little troubling. We proved that El Gamal encryption possesses a very strong notion of security; what went wrong? How could we adapt the protocol so that it achieves security? Consider the following protocol for two parties A and B to flip a fair coin (more complicated versions of this might be used for internet gambling): (1.) a trusted party T publishes a public key pk (from a public-key encryption scheme); (2.) A chooses a uniform random bit b, encrypts it using pk, and announces the ciphertext CA; (3.) next, B (similarly) chooses a uniform random bit bB, encrypts it using pk, and announces the ciphertext CB; (4.) T decrypts both b and bB, and announces the results; the parties XOR the results to obtain the value of the coin. (a) Argue that even if A is dishonest (but B is honest), the final value of the "coin toss" is uniformly distributed. (b) Assume that the parties use El Gamal encryption (where the bit b is encoded as the group element gb before being encrypted-note that efficient decryption is still possible). Show how a dishonest B can bias the resulting coin to be any value she likes. (c) This is a little troubling. We proved that El Gamal encryption possesses a very strong notion of security; what went wrong? How could we adapt the protocol so that it achieves security?
Expert Answer:
Related Book For
Posted Date:
Students also viewed these programming questions
-
Let A, B be sets. Define: (a) the Cartesian product (A B) (b) the set of relations R between A and B (c) the identity relation A on the set A [3 marks] Suppose S, T are relations between A and B, and...
-
Developments in Technology Light is incident from air on the end face of a multimode optical fibre at angle of incidence as shown below. n n 1 2 The refractive indices of the core and cladding are...
-
Use the data given in Table to construct a frequency distribution with a first class (in millions) of 50-99. Novel Copies Sold (millions) Don Quixote . . . . . . . . . . . . . . . . . . . . . . . . ....
-
A lease agreement between Hebert Corporation and Russell Corporation is described in E20-3. In E20-3 The following facts are for a non-cancellable lease agreement between Hebert Corporation and...
-
Good Company purchased a used machine by issuing 1,000 shares of its common stock to the seller. Good's stock is traded on the NYSE. On the date of purchase, its price was quoted at $42 per share,...
-
Most commercially available chess programs for home users are designed to play at a range of levels from beginner up to grandmaster. Consider the additional difficulties involved in programming a...
-
1. Identify and describe the major ethical issues facing Wal-Mart and the stakeholders likely to be affected. 2. Wal-Mart has been said to have excessive power in its relationship with communities....
-
Riziki Insurance Company Ltd . was incorporated in year 2 0 1 9 . The company deals with different classes of insurance. The following trial balance was extracted from the books of accounts as at 3 1...
-
Give the journal entries and record in the third paragraph that I should put in my T account. Tempest Tech Incorporated (TTI), a new-age technology company located in Mississauga, Ontario, began...
-
What are the Compliance-Based Codes of Ethics and Value-Based Codes of Ethics? Why are they important in International Ventures? Describe why responsible sourcing is included in many organizational...
-
Every culture is different. According to Hofstede, much of this variability can be accounted for by six cross-cultural values. Briefly describe them and indicate how each of these values may impact...
-
Describe the stages a 22-year-old university student would go though when purchasing a new computer. Also, describe the process the same individual would go through when purchasing a frozen pizza.
-
The summary of significant accounting policies note typically includes the Blank______. Multiple select question. revenue recognition policies used in fund financial statements policy regarding...
-
select a business that would like to develop new products and services in order to attain a competitive advantage in the global market. For example, a natural foods company may need to begin offering...
-
(4) In each of the following cases write down the normal vectors of the given lines and hence find the acute angles between them: (a) 2x - 5y - 3 = 0, 3r + 7y = 10; (b) 2r + 3y- 2 = 0, 2x 8y + 19 =...
-
Modify the counter from Exercise 5.44 such that the counter will either increment by 4 or load a new 32-bit value, D, on each clock edge, depending on a control signal Load. When Load = 1, the...
-
A 0.450-g sample of steel contains manganese as an impurity. The sample is dissolved in acidic solution and the manganese is oxidized to the permanganate ion MnO4-. The MnO4-ion is reduced to Mn2+ by...
-
The ionization energies of sodium (in kJ/mol), starting with the first and ending with the eleventh, are 495.9, 4560, 6900, 9540, 13,400, 16,600, 20,120, 25,490, 28,930, 141,360, 170,000. Plot the...
-
The following "cycle of copper" experiment is performed in some general chemistry laboratories. The series of reactions starts with copper and ends with metallic copper. The steps are as follows: (1)...
-
A diesel engine of mass \(300 \mathrm{~kg}\) and operating speed \(1800 \mathrm{rpm}\) is found to have a rotating unbalance of \(1 \mathrm{~kg}-\mathrm{m}\). It is to be installed on the floor of an...
-
A sensitive electronic system, of mass \(30 \mathrm{~kg}\), is supported by a spring-damper system on the floor of a building that is subject to a harmonic motion in the frequency range \(10...
-
A machine of mass \(1150 \mathrm{~kg}\) is mounted on springs. A piston of mass \(m=25 \mathrm{~kg}\) moves up and down in the machine at a speed of \(600 \mathrm{rpm}\) with a stroke of \(350...
Study smarter with the SolutionInn App