Skip to main content

Questions tagged [security-definition]

Questions about formal definitions of "security" for various cryptographic schemes (e.g. perfect secrecy, semantic security, ciphertext indistinguishability, etc.)

5 votes
2 answers
141 views

It is widely known that elliptic curve Diffie-Hellman is vulnerable to maliciously crafted public keys, where a honestly generated private key combined with a malicious public key may result in ...
twisteroid ambassador's user avatar
1 vote
1 answer
130 views

if I understand correctly, there is a pre-challenge phase in the CPA security game in which the attacker sends messages to the encryption oracle and receives ciphertexts. Then there is a challenge ...
user137526's user avatar
1 vote
0 answers
71 views

I am investigating the security implications when an attacker has simultaneous access to both encryption and decryption oracles for a symmetric encryption algorithm. Specifically, by "...
user140399's user avatar
4 votes
2 answers
101 views

Intuitively, IND-CPA security should imply key recovery security (KR-CPA) for a symmetric encryption scheme $\Sigma$. Indeed, showing this is often given as a homework in various textbooks, such as ...
hakoja's user avatar
  • 2,807
0 votes
0 answers
52 views

Construct a public-key encryption scheme which is CPA secure but not circularly secure, relying only on the existence of public-key encryption schemes. This is a problem from my cryptography course ...
minukesis's user avatar
5 votes
1 answer
167 views

The intuition behind simulation-based security proofs comes from the following idea — if any party participating in a protocol or system can fully simulate the entire interaction process without ...
DSTBP's user avatar
  • 331
4 votes
2 answers
185 views

The security strength of Hash based DRBG (Hash_DRBG and HMAC_DRBG) confuses me. Which property of Hash determines the security strength of DRBG? For example, which SHA2 algorithms can be used to ...
Citrus Poon's user avatar
3 votes
1 answer
484 views

I'm familiar with proofs of security that assume a Probabilistic Polynomial-Time (PPT) adversary and formulate the cryptographic assumptions by saying that the adversary has a negligible probability ...
LarryX's user avatar
  • 85
5 votes
3 answers
417 views

This question asks if a certain definition of unkeyed collision-resistant hash functions makes sense (i.e., it can be employed in usual security proofs) or, if not, what are its flaws. Some context is ...
LarryX's user avatar
  • 85
1 vote
0 answers
67 views

I am performing a cryptographic audit and reconstruction for a secure voting system inspired by Pret-a-voter. I currently have access to deterministic PRF mapping (Layer-1) and modulo/checksum filter (...
Rayan Humane's user avatar
1 vote
0 answers
101 views

I have read quite a lot about ZKPs, so I THINK to know what a simulation-based proof is (of course I have extensively meet them regarding zero-knowledge-ness), but I often also hear about game-based ...
baro77's user avatar
  • 830
1 vote
1 answer
128 views

Suppose we have a hard problem, and a signature scheme based on that hard problem. Why do we try and bound the advantage of forger for the signature scheme above by the advantage of an adversary ...
MathematicallyUnsound's user avatar
1 vote
1 answer
79 views

In Shamir secret sharing if we need to secret share a value such that if t+1 shares can reconstruct the secret then we use degree $t$ polynomial $f$. What happens if I share another secret using same ...
Crypto_Research's user avatar
0 votes
0 answers
46 views

In the context of secure multi-party computation (MPC), I often see different assumptions about the adversary. What is the difference between the non-colluding assumption and the assumption that the ...
rzxh's user avatar
  • 73
1 vote
2 answers
368 views

Kerckhoffs's principle in cryptography says that one should design a cryptosystem under the assumption that everything about it, except the key, is public knowledge. Is this principle really necessary?...
AimaneSN's user avatar

15 30 50 per page
1
2 3 4 5
23