浙大暑期课程
Provable Security Basics
Modern Cryptography:
- Confidentiality
- Integrity
- Authentication
Provable Security:
- Precisely specify threat model
- Propose a construction
- Write a formal proof(reduction)
One-way function:
f(x) is polynomial-time computable for all x
For all PPT algorithm
Discrete Logarithm Problem
Let be a neneric, polynomial-time, group generation algorithm
Input , output
1.Generate
2.Choose a uniform
3.Obtain
4.Return 1 iff
CDH vs DL
Theorem: if the CDH problem is hard relative to then discrete logarithm problem is also hard relative to
MPC
安全多方计算
安全多方计算的分类
2-move Two-party Computation
- Encode a by using pk
- Compute f(a,b) over encoded inputs
- Decode c by using sk, botain f(a,b)
Elgamal is IND-CPA Secure
If the DDH problem is hard relative to ,then the Elgamal encryption scheme is IND-CPA secure
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明来自 Hibara!