[Solved] VE475 Introduction to Cryptography Homework 8

$25

File Name: VE475_Introduction_to_Cryptography_Homework_8.zip
File Size: 423.9 KB

SKU: [Solved] VE475 Introduction to Cryptography Homework 8 Category: Tag:
5/5 - (1 vote)

Ex. 1 Lamport one-time signature scheme

  1. Describe the Lamport signature scheme.
  2. Highlight the benefits and drawbacks of this method.
  3. Explain how this scheme can be attacked is a same key is used to sign more than one message.
  4. What is a Merkie tree, and how can it be used to improve the efficiency of the Lamport one-time signature scheme?

Ex. 2 Chaum-van Antwerpen signatures

In the lectures we presented the concept of undeniable signatures but we did not prove any of the results. We now do it, reusing the same notations.

  1. In this question we want to prove that ifs mx mod p, then swill be accepted as a valid signature with probability less than 1/q.
  2. For each value r Alice generates, how many ordered pairs e1, e2 can be considered?
  3. Writing r = i, t = j, m = k, and s = l, i,j, k, l Z/qZ, consider the system of congruences

r se1e2 mod p t me1e2 mod p,

and prove it has a unique solution.

  1. Conclude on the probability that Alice accepts an invalid signature.
  2. We now prove that if s mx mod p, and the disavowal protocol is respected then we should have

(t1e2)f1 (t2f2)e1 mod p.

  1. Prove that

(t1e2)f1 se1f1x1 mod p.

  1. Applying the same method to (t2f)e1 mod p conclude that Bob can convince Alice that an invalid signature is a forgery.
  2. We finally prove that if s mx mod p, but t1 me1e2 and t2 mf1f2, then (t1e2)f1 (t2f2)e1 mod p with probability 1 1/q.
  3. Prove this result by contradiction using question 1.
  4. Does this result require Bob to follow the disavowal protocol?
  5. Can Bob convince Alice that a valid signature is a forgery?

Ex. 3 Simple questions

  1. DSA with the parameters q = 101, p = 7879, a = 170, x = 75, and 3 = 4567 is used to signed a message whose hash is 52.
  2. Determine the signature of the message if k = 49.
  3. Verify the signature.
  4. Bob used the Elgamal signature scheme to sign his messages m1 = 8990 and m2 = 31415. He got m1, 23972, 31396), and (m2,23972.20481). Knowing his public parameters are p = 31847, a = 5, and 0 = 25703, recover both the random value k and his private key x.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[Solved] VE475 Introduction to Cryptography Homework 8[Solved] VE475 Introduction to Cryptography Homework 8
$25