CSE442T Introduction to Cryptography (Lecture 17)
Chapter 3: Indistinguishability and Pseudorandomness
Public key encryption scheme (1-bit)
is the trapdoor permutation. (eg. RSA)
, where is the public key and is the secret key.
where is denoted as and is the tag .
The decryption function is:
:
Validity of the decryption
Proof of the validity of the decryption: Exercise.
Security of the encryption scheme
The encryption scheme is secure under this construction (Trapdoor permutation (TDP), Hardcore bit (HCB)).
Proof
We proceed by contradiction. (Constructing contradiction with definition of hardcore bit.)
Assume that there exists a distinguisher that can distinguish the encryption of and with non-negligible probability .
By prediction lemma (the distinguisher can be used to create and adversary that can break the security of the encryption scheme with non-negligible probability ).
We will use this to construct an agent which can determine the hardcore bit of the trapdoor permutation with non-negligible probability.
are determined.
is given and and outputs .
- is chosen uniformly at random.
- is given to .
- is given to .
- Choose uniformly at random.
- Then use with to determine whether is or .
- Let .
- Since , we have , .
- Output .
The probability that correctly guesses given is:
This contradicts the definition of hardcore bit.
Public key encryption scheme (multi-bit)
Let .
We can choose random , , .
Special public key cryptosystem: El-Gamal (based on Diffie-Hellman Assumption)
Definition 105.1 Decisional Diffie-Hellman Assumption (DDH)
Define the group of squares mod as follows:
, , ,
These two listed below are indistinguishable.
(Computational) Diffie-Hellman Assumption:
Hard to compute given .
So DDH assumption implies discrete logarithm assumption.
Ideas:
If one can find from , then one can find from and compare to to check whether is a valid DDH tuple.
El-Gamal encryption scheme (public key cryptosystem)
:
Output:
(public key)
(secret key)
Message space:
:
Output:
:
Since , we have
Output:
Security of El-Gamal encryption scheme
Proof
If not secure, then there exists a distinguisher that can distinguish the encryption of with non-negligible probability .
And proceed by contradiction. This contradicts the DDH assumption.