{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

12h - Cryptography and Protocols CCA-Security 12-2 CCA...

Info icon This preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
21/02/2012 1 Introduction CCA-Security Cryptography and Protocols Andrei Bulatov Cryptography and Protocols – CCA-Security 12-2 CCA Security (take 1) Let (K,E,D) be a symmetric encryption scheme and (T, ε ) a superpolynomial pair. Consider the following game: (1) Alice and Bob choose a shared k at random from (2) Eve gets access to black boxes and (3) Eve chooses and (4) Alice chooses i {1,2} at random and gives Eve (5) Eve gets more access to black boxes and (6) Eve outputs j {1,2} Eve wins if j = i. Scheme (K,E,D) is (T, ε )-CCA-secure if for any if of time complexity at most T Pr[Eve wins] < 1/2 + ε n } 1 , 0 { ) ( k E ) ( k D 1 P 2 P ) ( i k P E C = ) ( k E ) ( k D Cryptography and Protocols – CCA-Security 12-3 CCA Security (fix) Change (5) to: (5’) Eve gets access to black boxes and , where ) ( k E ) ( ' k D = = C C C C C D C D k k ' , ' ), ' ( ) ' ( ' if if Cryptography and Protocols – CCA-Security 12-4 Construction of a CCA-Secure Scheme Let (Sign, Ver) be a CMA-secure MAC and (K’,E’,D’) a CPA-secure scheme. Define (K,E,D) as follows K: keys k, k’ selected uniformly at random from E: compute , , and send (C,t) D: Upon receiving (C,t), first verify that if not, abort (output ). If check passes compute n } 1 , 0 { ) ( ' P E C k = ) ( ' C t k Sign = 1 ) , ( ' = t C k Ver ) ( ' C D k Cryptography and Protocols – CCA-Security 12-5 Security A MAC (Sign, Ver) satisfies the unique signatures property if for any message there at most one tag that certifies it.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern