<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wikidot="http://www.wikidot.com/rss-namespace">

	<channel>
		<title>Course Forum, Fall 2019/2020 (new posts)</title>
		<link>http://tau-foc-f19.wikidot.com/forum/c-6499224/course-forum-fall-2019-2020</link>
		<description>Posts in the forum category &quot;Course Forum, Fall 2019/2020&quot;</description>
				<copyright></copyright>
		<lastBuildDate>Mon, 16 Mar 2026 02:36:48 +0000</lastBuildDate>
		
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486964</guid>
				<title>Exam F17 A question 2 a: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486964</link>
				<description></description>
				<pubDate>Sun, 02 Feb 2020 07:35:02 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Yes. Note that given a public key <span class="math-inline">$pk$</span> sampling a matching secret key is at least as hard as breaking the encryption.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486947</guid>
				<title>Exam F17 A question 2 a: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486947</link>
				<description></description>
				<pubDate>Sun, 02 Feb 2020 07:15:49 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Thanks!<br /> So if I generated a pair of (sk_1,pk) and you generated the pair (sk_2,pk), I will be able to decrypt messages that are sent to you with my secret key?</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486924</guid>
				<title>Exam F17 A question 2 a: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486924</link>
				<description></description>
				<pubDate>Sun, 02 Feb 2020 06:47:21 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>No, it doesn't. By the correctness of the scheme it must be decrypted under both keys to whichever message was encrypted.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486559</guid>
				<title>Exam F17 A question 2 a: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486559</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 21:51:27 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>But doesn't it mean that a cipher text that was encrypted with the same public key can be decrypted to 2 different messages, based on the corresponding secret key?<br /> If so, then the commitment does not have to be binding, the fact that the public key is the same and the cipher text is the same does not mean that the message is the same ( I will be able to open the commitment to 2 different messages).</p> <p>What do I miss here?</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001948#post-4486443</guid>
				<title>Exam 2017 A question 1b: Re: Exam 2017 A question 1b</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001948/exam-2017-a-question-1b#post-4486443</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 17:57:11 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>We didn't show that this function is OW in lecture 3, we showed that a different function is OW.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001948#post-4486381</guid>
				<title>Exam 2017 A question 1b: Exam 2017 A question 1b</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001948/exam-2017-a-question-1b#post-4486381</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 16:50:16 +0000</pubDate>
				<wikidot:authorName>shelly</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>It seems that the counter example described in the solution works even for messages of length 2n (and the sk remains the same) - the encryption scheme will get m,r both of length 2n, the expansion of the PRG will be 2n instead of n+1 and in case that sk != 1^n we will output: G(sk) XOR m, 0^2n. It seems that the scheme is secure since sk = 1^n w.p at most 2^-n and in case that sk != 1^n the output of the xor is pseudorandom since G is PRG. The adversary will invert the function exactly in the same way as in the solution (the suffix is always 0^2n thus for sk = 1^2n we get (r,m)).<br /> However, in lecture 3 we claimed that for messages of length 2n the function is OWF. So where am i wrong?<br /> Thanks!!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486246</guid>
				<title>Exam F17 A question 2 a: Re: Exam F17 A question 2 a</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486246</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 14:24:30 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>They don't have to be equal as strings, and the proof in the solution doesn't assume they are, it just invokes the perfect correctness guarantee. In particular, there exist public-key encryption schemes where a single public key may have many corresponding secret keys. As an uninteresting example you can always pad the key with bits that are ignored (there are also interesting examples&#8230;).</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486162</guid>
				<title>Exam F17 A question 2 a: Exam F17 A question 2 a</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486162</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 12:47:18 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>It sounds from the solution that if G created the same public key for 2 randomnesses then it must create the same public key.</p> <p>Is it correct? I could not convince myself that it is, but the solution is dependent on it if I understood correctly.</p> <p>Hope the question is clear, will write it more formally:<br /> if G generates secret and public keys for a public key encryption, and for randomness r_g it created (sk,pk), and for randomness r_g_2 it created (sk^', pk), does it mean that sk^' == sk?</p> <p>Otherwise I think there is a counter example for the solution described.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485888</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485888</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 08:36:17 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>A CPA-secure encryption cannot be deterministic (we talked about it).</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485861</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485861</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 08:09:37 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Now I got it. Thank you very much!<br /> (The original scheme had no randomness, that's why I failed to understand it so far)</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485849</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485849</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 07:51:47 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p><span class="math-inline">$D_{sk}$</span> is a deterministic operation so the probability is one or zero. The scheme is constructed so that it is one.</p> <p>Let's add more details:<br /> Take any CPA-secure scheme <span class="math-inline">$(E',D')$</span> and now construct a new scheme <span class="math-inline">$(E,D)$</span> that is defined as follows: <span class="math-inline">$E$</span> uses randomness of size <span class="math-inline">$\ell+n$</span> where <span class="math-inline">$\ell$</span> is the amount of randomness used by <span class="math-inline">$E$</span>, we'll parse the randomness used by <span class="math-inline">$E$</span> as two random strings <span class="math-inline">$r,r'$</span> of respective lengths $n,\ell$. Define <span class="math-inline">$E_{sk}(m;r,r')$</span>: if <span class="math-inline">$m=0^n,r=1^n$</span>, output <span class="math-inline">$0^n$</span>, else output <span class="math-inline">$E'_{sk}(m;r')$</span>. Define <span class="math-inline">$D_{sk}(ct)$</span> as follows: if <span class="math-inline">$ct=0^n$</span> output <span class="math-inline">$0^n$</span>, else output <span class="math-inline">$D'_{sk}(ct)$</span>.</p> <p>Assuming that <span class="math-inline">$E'$</span> doesn't encrypt length-<span class="math-inline">$n$</span> plaintexts into <span class="math-inline">$0^n$</span>, the scheme is perfectly correct (this assumption is w.l.og, can always pad with 1). It's also secure, as except with negligible probability it's identical to <span class="math-inline">$E$</span>. If you define a MAC where authentication of <span class="math-inline">$m$</span> is a random encryption <span class="math-inline">$E_{sk}(m)$</span>, and verification of <span class="math-inline">$m,ct$</span> is checking whether <span class="math-inline">$D_{sk}(ct) = m$</span>, you get an insecure MAC &#8212;- the attacker that outputs <span class="math-inline">$0^n,0^n$</span> wins with probability 1.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485802</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485802</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 06:35:10 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>But who says that the underlying plaintext is also <span class="math-inline">$0^n$</span>? That's what I don't understand here. The adversary forged that tuple of <span class="math-inline">$(m^*=0^n, t^*=0^n)$</span>. I claim that <span class="math-inline">$Pr[D_{sk}(t^*) \neq 0^n] &gt; 1 - \mu(n)$</span>, hence the adversary will fail with non-negligible probability.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485767</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485767</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 05:56:51 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Decryption is deterministic and is determined by the ciphertext alone (in this case <span class="math-inline">$0^n$</span>). The fact that the underlying plaintext (in this case also <span class="math-inline">$0^n$</span>) has multiple different encryptions does not change that (these other ciphertext will also decrypt to <span class="math-inline">$0^n$</span>, but may look differently).</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485419</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485419</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 21:02:17 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>But it's a forge, the attacker doesn't really know that's true, he just guesses it (no queries are made to the oracle). Why do you claim it's true? <span class="math-inline">$E_{sk}(0^n)$</span> might also be something else than <span class="math-inline">$0^n$</span> with non-negligible probability (and then <span class="math-inline">$D_{sk}(0^n)$</span> would be something different from <span class="math-inline">$0^n$</span> which will fail the attacker).</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485349</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485349</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 19:25:59 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Verification is defined by decryption, and <span class="math-inline">$0^n$</span> decrypts to <span class="math-inline">$0^n$</span> (with probability <span class="math-inline">$1$</span>).</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485327</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485327</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 18:43:38 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>I'm sorry but I still don't understand how it will work with probability one.</p> <p>The adversary will generate <span class="math-inline">$(m^*, t^*) = (0^n, 0^n)$</span> as forgery. The verifier will check that it's actually true that <span class="math-inline">$E_{sk}(0^n) = 0^n$</span>, but that's only true with negligible probability. So <span class="math-inline">$Pr[Ver_{sk}(m^*, t^*) = 1] \leq \mu(n)$</span>, which is a secure MAC.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12998177#post-4485271</guid>
				<title>QR ZK protocol in Lecture 7: Re: QR ZK protocol in Lecture 7</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12998177/qr-zk-protocol-in-lecture-7#post-4485271</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 17:37:08 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>If I understand what you're saying, you seem to be suggesting a one-message protocol: <span class="math-inline">$P$</span> sends <span class="math-inline">$a = r^2, b= rx$</span>, <span class="math-inline">$V$</span> checks that <span class="math-inline">$ya = b^2$</span>.<br /> This protocol is not sound. A malicious prover can pick <span class="math-inline">$b$</span> arbitrarily and choose <span class="math-inline">$a = b^2/y$</span> and convince you of accepting a non-residue. Recall that in general, there cannot be one-message zero knowledge, except for trivial languages.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12998164#post-4485251</guid>
				<title>Exam number 1 question 3 b: Re: Exam number 1 question 3 b</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12998164/exam-number-1-question-3-b#post-4485251</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 17:23:11 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Sorry but I don't understand the first part of your question. You should first make sure you understand the solution to the HW5.Q1. Then you're welcome to try and reformulate the question more clearly. As for the second part, see Ohad's answer.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949#post-4485245</guid>
				<title>MAC security construction question: </title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question#post-4485245</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 17:14:34 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>As you described yourself: &quot;every secret key <span class="math-inline">$sk$</span> encodes <span class="math-inline">$0^n$</span> to <span class="math-inline">$0^n$</span> with negligible probability (over the encryption randomness)&quot;.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12998042#post-4485242</guid>
				<title>Exam number 1 question 2 a: Re: Exam number 1 question 2 a</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12998042/exam-number-1-question-2-a#post-4485242</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 17:11:58 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>No. The commitment should only be hiding and binding as defined in lecture 7.</p> 
				 	]]>
				</content:encoded>							</item>
				</channel>
</rss>