Assignment 3
Assignment 3
Assignment 3
September 9, 2024
Instructor: Chethan Kamath
Exercise 1 (MAC and verify oracle). Recall the definition of EU-CMA security for
MAC from Lecture 7 (Definition 2). Now, let’s consider a stronger definition, Definition
2′ where Tam is given access (in addition to the Tag(k, ·) oracle) to a “verify oracle”
Ver(k, ·, ·), which Tam can query on tag and message of her choice. Come up with a
MAC that is secure with respect to Definition 2, but not Definition 2′ .
Exercise 2 (One-way PKE). Recall the definition of IND-CPA for PKE from Lecture 8.
Now consider one-way (OW) CPA , an alternative notion of secrecy for PKEs defined as
follows for a PKE Π = (Gen, Enc, Dec):
Eve is given pk, generated as (pk, sk) ← Gen(1n ).
For m ← Mn , Eve is given c ← Enc(pk, m) as the challenge ciphertext.
Eve outputs m′ and breaks if m′ = m.
A PKE Π is OW-CPA-secure if for all PPT eavesdroppers Eve, the probability with which
Eve breaks Π as above is negligible. Now answer the following questions about IND-CPA
and OW-CPA.
1. Show formally that IND-CPA implies OW-CPA. That is, any PKE that is IND-
CPA-secure is also OW-CPA-secure.
2. What about the opposite direction? Show either that
(a) OW-CPA implies IND-CPA; or
(b) Come up with a counterexample, i.e., a PKE Π that is OW-CPA-secure but
not IND-CPA-secure.
Exercise 3 (Amplification via random self-reducibility (RSR)). In Lecture 8 we saw how
RSR can be exploited beat the hybrid argument. In this exercise, we exploit RSR of DDH
(Lecture 8, Assumption 2) and QR (Lecture 9, Assumption 3) to amplify distinguishing
advantage.
1. Consider the following seemingly stronger variant of DDH, named Assumption 2′
where we require the distinguishing advantage for every PPT adversaries to be
exponentially-close to 0: The DDH assumption holds in G w.r.to S if for all PPT
distinguishers D (and large enough n)
Show that Assumption 2′ implies Assumption 2. (Hint: invoke the distinguisher for
standard DDH multiple times and use Chernoff bound for analysis.)