/
Assignment #8 – Solutions Assignment #8 – Solutions

Assignment #8 – Solutions - PowerPoint Presentation

cheryl-pisano
cheryl-pisano . @cheryl-pisano
Follow
394 views
Uploaded On 2017-09-11

Assignment #8 – Solutions - PPT Presentation

Problem 1 Each participant selects a random polynomial The joint secret is the sum of the original secrets How are shares of the joint secret formed   3102011 Practical Aspects of Modern Cryptography ID: 587296

2011 modern aspects cryptography modern 2011 cryptography aspects practical encryption mix verifiable problem set elgamal computes secret group sum encryptions create joint

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Assignment #8 – Solutions" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Assignment #8 – SolutionsSlide2

Problem 1

Each participant

selects a random polynomialThe joint secret is the sum of the original secretsHow are shares of the joint secret formed?

 

3/10/2011

Practical Aspects of Modern CryptographySlide3

Problem 1

3/10/2011

Practical Aspects of Modern Cryptography123 

 

 

 

 

 

 

 

 Slide4

Problem 1

3/10/2011

Practical Aspects of Modern Cryptography123 

 

 

 

 

 

 

 

 

 

 

 

 Slide5

Problem 1

3/10/2011

Practical Aspects of Modern Cryptography123 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 Slide6

Problem 1

Participant

computes its share of the secret by taking the values (including the value which it can compute for itself) and forming the sum

 

3/10/2011

Practical Aspects of Modern CryptographySlide7

Problem 2

How does a set of

participants use their respective values to decode an ElGamal encryption ? 3/10/2011Practical Aspects of Modern CryptographySlide8

Problem 2

Lagrange Interpolation:

Given distinct pairs with , form the interpolated polynomial by computingThe joint secret can be computed as

 

3/10/2011

Practical Aspects of Modern CryptographySlide9

Problem 2

Each

with can compute its own portion of the sum

 

3/10/2011

Practical Aspects of Modern CryptographySlide10

Group ElGamal Encryption

Each recipient selects a large random private key

and computes an associated public key .The group key is .

To send a message to the group, Bob selects a random value

and computes the pair

.

To decrypt, each group member computes

. The message

.

 

March 3, 2011

Practical Aspects of Modern Cryptography

10Slide11

Problem 2

Each

with computes .The ElGamal encryption can now be decrypted as .

 

3/10/2011

Practical Aspects of Modern CryptographySlide12

Problem 3

Given a set of

ElGamal encryptions , create an equivalent set of ElGamal encryptions and prove the equivalence without revealing the correspondence. 3/10/2011Practical Aspects of Modern CryptographySlide13

Problem 3

Use

ElGamal re-encryption to create new encryptions of the same values and permute the results to create a new set.Interactively prove the equivalence by creating, say, 100 additional equivalent permuted “intermediate” sets in exactly the same way.Answer each challenge by associating each intermediate set with either the original set of the new derived set. 3/10/2011Practical Aspects of Modern CryptographySlide14

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide15

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide16

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide17

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide18

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide19

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide20

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide21

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide22

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide23

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide24

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide25

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide26

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide27

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide28

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide29

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide30

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide31

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide32

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide33

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide34

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide35

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide36

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide37

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide38

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide39

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide40

A Verifiable Re-encryption Mix

3/10/2011

Practical Aspects of Modern CryptographySlide41

A Verifiable Re-encryption MixSlide42

Problem 3

The challenges for this re-encryption mix can be obtained by feeding all of the intermediate and final ballot sets into a cryptographic hash function such as SHA-1.

The output bits of the hash can be used as the challenge bits in an interactive proof.3/10/2011Practical Aspects of Modern Cryptography