Cryptography Reference
In-Depth Information
The essential difference is that the success probability of the case v = 0 is
not guaranteed to be related in a predictable manner to the overall probability
of success. In particular what we may argue is that in each conditional space
A i the success probability of the adversary in the experiment p v satisfies that
p 0 = 1/2+α i for some α i (this is without loss of generality as if an adversary
drops below 1/2 in its prediction capability in a certain conditional space
there exists another adversary that by flipping its answer does better than
1/2) and p q = 1/2. The latter statement follows from the fact that when v = q
no information about the plaintext is transmitted to the adversary. Regarding
the former, we use α i to denote the success of the adversary in the conditional
space A i . Regarding the α i values we know that
` · P i=1 (1/2+α i ) = 1/2+.
Based on this there must be an i 0 such that α i 0 ≥ /`. Indeed, if α i < /`
for all i = 1,...,` we have that the success probability would be less than
1/2 + , a contradiction. As a result we can find some v 0 for which it holds
that |p i v 0 −1 −p i v 0 | ≥ /(`q). Now the proof can be completed with identical
arguments to those of theorem 3.3 while operating in the conditional A i 0
space.
1
3.2.3 Boneh-Franklin Multiuser Encryption Scheme
The scheme works in conjunction to a multiplicative cyclic group G of large
prime order over which solving the Decisional Di e Hellman (DDH) Problem
is hard (a definition will be given shortly). Vectors in Z q will be denoted by
δ = hδ 1 ,...,δ ` i.
A possible example for G can be the subgroup of order q of Z p , where
q | p−1 and p,q are large primes. It is helpful to keep in mind that arithmetic
in the exponents is performed in the finite field Z q , i.e., g x+y = g x+y mod q
and similarly for exponentiation g a·b = g a·b mod q .
For some ` ∈ N, let h 0 ,h 1 ,...,h ` be random elements of G so that h j = df
g r j for j = 0,...,` and define the vector r = df hr 1 ,...,r ` i. A representation
of h 0 with respect to the base h 1 ,...,h ` is an `-vector δ = df 1 ,...,δ ` i such
that h 0 = h δ 1 ...h δ ` , or equivalently δ · r = r 0 where · denotes the inner
product between two vectors.
Let Gen be a polynomial-time algorithm that receives 1 k as input (where
k is a security parameter) and it samples the description of a multiplicative
group as well as of an element g inside this group. While we will avoid making
the group description explicit we assume that it contains su cient information
to perform the multiplication operation as well as it contains a membership
test for the group; the value q is the prime order of the cyclic subgroup gen-
erated by g. We further require that k < log q < k+1 something that implies
that the group G cannot be specified as a list of elements.
Based on Gen, we define the Boneh-Franklin multiuser encryption scheme
with parameters k,`N as follows
Search WWH ::




Custom Search