Cryptography Reference
In-Depth Information
with tag τ . Finally,
outputs a b for the guess of b .If b = b then
wins
the game. Just as the selective-tag CCA experiment, our goal is to prove that
Adv tbe - stag - cca
TBE,A
A
A
( λ ) is negligible.
Game 1 : This game is identical to Game 0 , except that when the simulator gen-
erates the ( pk, dk ), the simulator replace ( s ,td )
S abo ( λ, 0 v )with( s ,td )
S abo ( λ, τ ). Notice that in this game, the simulator still decrypts queries using
the injective function trapdoor td , and the ABO function trapdoor td is never
used.
Game 2 : This game is identical to Game 1 , except that when the simulator de-
crypts queries, it replaces x = F 1 ( td, c 1 )with x = G 1 ( td ,τ,c 2 ). Note that
the simulator performs all the consistency checks, and
is not allowed to make
queries with tag τ , the simulator can always answer the query. Also note that
the injective function trapdoor td isneverusedinthisgame.
A
Game 3 : This game is identical to Game 2 , except that when the simulator gen-
erates the ( pk, dk ), the simulator replaces ( s, td )
S ltf ( λ, injective )with
( s,
)
S ltf ( λ, lossy ).
Game 4 : This game is identical to Game 3 , except that when the simulator gen-
erates the challenge ciphertext c =( c 1 ,c 2 ,c 3 ), it replaces c 3 = m b
h ( x )with
c 3 = r
ρ .
←{
0 , 1
}
Observe that the adversary's views in Game 4 are identical for either choice of
b
∈{
0 , 1
}
, because b is never used in the game. We show the following results.
Lemma 6. The adversary's views in Game 0 and Game 1 are computationally
indistinguishable, assuming the hidden lossy branch property of the ABO trapdoor
functions.
Proof. We show that the adversary's views in Game 0 and Game 1 , conditioned
on any fixed value of τ , are computationally indistinguishable.
For any fixed τ , assume the adversary's views in Game 0 and Game 1 are dis-
tinguishable, we construct a PPT adversary
to distinguish lossy branches 0 v
B
and τ
of ABO trapdoor functions. Given an ABO function index s
which is
generated as either ( s ,td )
S abo ( λ, 0 v )or( s ,td )
S abo ( λ, τ ),
B
generates
, and outputs pk =( s, s ,h ).
( s, t )
imple-
ments decryption oracle and generates challenge ciphertexts exactly as in Game 0
and Game 1 which are identical. Note that
S ltf ( λ, injective ), and h
←H
B
B
can do so because it generates the
injective function trapdoor td itself.
By the construction the view generated by
is exactly Game 0 when s is gen-
erated by S abo ( λ, 0 v ), and is exactly Game 1 when s is generated by S abo ( λ, τ ).
Proof is completed.
B
Search WWH ::




Custom Search