<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wikidot="http://www.wikidot.com/rss-namespace">

	<channel>
		<title>Course Forum, Fall 2019/2020 (new threads)</title>
		<link>http://tau-foc-f19.wikidot.com/forum/c-6499224/course-forum-fall-2019-2020</link>
		<description>Threads in the forum category &quot;Course Forum, Fall 2019/2020&quot;</description>
				<copyright></copyright>
		<lastBuildDate>Sat, 11 Apr 2026 08:12:09 +0000</lastBuildDate>
		
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001948</guid>
				<title>Exam 2017 A question 1b</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001948/exam-2017-a-question-1b</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 16:50:16 +0000</pubDate>
				<wikidot:authorName>shelly</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>It seems that the counter example described in the solution works even for messages of length 2n (and the sk remains the same) - the encryption scheme will get m,r both of length 2n, the expansion of the PRG will be 2n instead of n+1 and in case that sk != 1^n we will output: G(sk) XOR m, 0^2n. It seems that the scheme is secure since sk = 1^n w.p at most 2^-n and in case that sk != 1^n the output of the xor is pseudorandom since G is PRG. The adversary will invert the function exactly in the same way as in the solution (the suffix is always 0^2n thus for sk = 1^2n we get (r,m)).<br /> However, in lecture 3 we claimed that for messages of length 2n the function is OWF. So where am i wrong?<br /> Thanks!!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365</guid>
				<title>Exam F17 A question 2 a</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 12:47:18 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>It sounds from the solution that if G created the same public key for 2 randomnesses then it must create the same public key.</p> <p>Is it correct? I could not convince myself that it is, but the solution is dependent on it if I understood correctly.</p> <p>Hope the question is clear, will write it more formally:<br /> if G generates secret and public keys for a public key encryption, and for randomness r_g it created (sk,pk), and for randomness r_g_2 it created (sk^', pk), does it mean that sk^' == sk?</p> <p>Otherwise I think there is a counter example for the solution described.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12998177</guid>
				<title>QR ZK protocol in Lecture 7</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12998177/qr-zk-protocol-in-lecture-7</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 14:43:56 +0000</pubDate>
				<wikidot:authorName>Keren Ganon</wikidot:authorName>				<wikidot:authorUserId>5854645</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>In the first ZK example for The QR language, V samples a bit b and P answers different answers according to it.</p> <p>Why is this necessary? If we were to remove this bit sampling and have P always send rx to V, wouldn't this still work?<br /> Then the simulator would simply always return y<sup>-1</sup>r<sup>2</sup> to V as the first message.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12998164</guid>
				<title>Exam number 1 question 3 b</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12998164/exam-number-1-question-3-b</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 14:37:18 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>I don't understand the first equation in the solution and maybe I'm missing a more significant part of the question here.<br /> If we know that the prover is convincing the verifier w.p. 1/100, why do we need the other expression in some session? The prover is deterministic so I don't see the reason for the 2 probabilities.</p> <p>And additionally, why is there a 2|E| instead of |E| in the denominator?</p> <p>Thanks!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12998042</guid>
				<title>Exam number 1 question 2 a</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12998042/exam-number-1-question-2-a</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 13:15:42 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Don't we need to prove a stronger claim in order to show it's a valid commitment scheme? that under different public keys 2 messages are computational indistinguishable? i.e. to prove that <span class="math-inline">$Com(m_1; (r_{g_1}, r_e)) \approx_c Com(m_2; (r_{g_2}, r_e))$</span> (since different <span class="math-inline">$r_g$</span> can lead to different public keys).</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997949</guid>
				<title>MAC security construction question</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997949/mac-security-construction-question</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 12:12:53 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Hi,</p> <p>I saw a construction that given CPA secure encryption scheme, you construct a MAC scheme as follows:<br /> <span class="math-inline">$Auth_{sk}(m) = Enc_{sk}(m)$</span></p> <p>The question was either it's secure or not.</p> <p>The answer that it's not, and the solution was to create a new encryption scheme E' such that for every key (sk) the text <span class="math-inline">$0^n$</span> is encoded to <span class="math-inline">$0^n$</span> with some negligible probability. Then, an adversary can simply generate <span class="math-inline">$(0^n, 0^n)$</span> as a forgery.</p> <p>I don't see why this is correct, because it will only happen with negligible probability (by the definition of E').</p> <p>What am I missing here?</p> <p>Thanks!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12997569</guid>
				<title>MAC</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12997569/mac</link>
				<description></description>
				<pubDate>Fri, 31 Jan 2020 08:26:28 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>If we have a MAC with authorization algorithm AUTH, does the following must be computationally indistinguishable?<br /> 1. U_n, Auth_sk(U_n)<br /> 2. U_n, (U_n)^'</p> <p>Basically the question is does the fact that the adversary cannot forge a signature to a new message means that he cannot tell when the signature is correct?<br /> Thanks!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12995985</guid>
				<title>Lecture 3 SKE implies OWF</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12995985/lecture-3-ske-implies-owf</link>
				<description></description>
				<pubDate>Thu, 30 Jan 2020 18:44:49 +0000</pubDate>
				<wikidot:authorName>shelly</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Hi, i have a question regarding Theorem 3.4. Is there any reason why E uses randomness? I mean, if we remove the randomness the function still be one way? If not, why?<br /> Thanks!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12995115</guid>
				<title>Exam test number 2 question 3 b</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12995115/exam-test-number-2-question-3-b</link>
				<description></description>
				<pubDate>Thu, 30 Jan 2020 11:11:59 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>In the solution to question 3.b, it is mentioned that from witness indistinguishably, you deduce that you cannot distinguish between the following distributions:<br /> 1. {P(w_1),V*(x), P(w_1)V*(x)} =S_1,1<br /> 2. {P(w_o),V*(x), P(w_1)V*(x)} = S_0,1</p> <p>I understand why if this claim is correct the claim in the question is correct.<br /> But, I try to formulate why this claim is correct and do not manage to do so:</p> <p>1. Assume there is a PPT A that can distinguish between S_1,1 and S_0,1 with non-negligible probability.<br /> 2. Now I would like to use A to distinguish between {P(w_1)V*(x)} and {P(w_0)V*(x)} and by witness indistinguishability deduce that this A does not exist.<br /> 3. Our distinguisher B will get y which is either from p(w_1)V*(x) or P(w_0)V*(x)<br /> 4. Now I would like to send A {y,P(w_1)V*(x)} and return whatever A does.<br /> 4. My problem is that I cannot really sample interaction with the P and be sure that he is using w_1. Or can I?</p> <p>Thanks,</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12994855</guid>
				<title>Multi-message encryption without PRFs</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12994855/multi-message-encryption-without-prfs</link>
				<description></description>
				<pubDate>Thu, 30 Jan 2020 09:01:33 +0000</pubDate>
				<wikidot:authorName>Keren Ganon</wikidot:authorName>				<wikidot:authorUserId>5854645</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>In the end of lecture 4 before introducing PRFs, we talked about using our current set of tools to support multi-message encryption.<br /> In both of the examples (stream ciphers and public synchronization) the main issue was that we have to maintain a state.</p> <p>Is this the only way to support multi-message encryption? If the encryption is random, isn't this sufficient for multi-message encryption?</p> <p>My main wonder here is what do PRFs introduce to us that wasn't possible before.<br /> If this is stateless multi-message encryption, then why wasn't this possible before?</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12989104</guid>
				<title>Perfect secrecy definitions</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12989104/perfect-secrecy-definitions</link>
				<description></description>
				<pubDate>Tue, 28 Jan 2020 16:36:23 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Hi,<br /> From lecture 1:<br /> How do we show that the 4th definition of perfect secrecy is equivalent to the others?<br /> (The one with the fact that for a subset S the probability to output the message after encrypting is less than 1/|S|).</p> <p>Thanks</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12988998</guid>
				<title>Lecture 9 questions</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12988998/lecture-9-questions</link>
				<description></description>
				<pubDate>Tue, 28 Jan 2020 15:39:32 +0000</pubDate>
				<wikidot:authorName>AvivB</wikidot:authorName>				<wikidot:authorUserId>5908253</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Hi,<br /> I have some question regarding Lecture 9:</p> <p>1. Page 4, Claim 2.4: I didn't understand your comment about fixing the inputs for g_hat protocols. By fixing you mean for specific bits of inputs?<br /> Why can we do that? how does it reduce the burden of prooving indistinguishability for the whole view?<br /> 2. Page 4, Remark about the original GMW construction: Can you please explain why it is sufficient to run the protocol only for MUL gates? (what is &quot;the protocol&quot; that we are supposed to run?).</p> <p>3. Page 5, Garbling Scheme definition: Why do we need to encode the description of f if the simulator also gets f? (we assume that f is public)<br /> 4. Page 6, Yao's Garbled Circuit:<br /> - In the first stage, each wire samples two secret keys. Are they one-bit? multiple-bits?<br /> Also, we assumed a secret-key encryption scheme. Does the cipher's length equal to the secret key's length? (The table T_g implies that).<br /> - In the second stage, we mentioned a mapping for the output wire. b can be either 0 or 1, and there is only one output wire. can't we turn it to two bits table? am I wrong somewhere?<br /> - In the fourth stage, we saw v(w). I don't understand how do we get this function, and what it does. I guess that it has to use the gate's table T_G somehow.</p> <p>Thanks, and sorry (again) for the long questions.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12988659</guid>
				<title>Allowed material in the exam</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12988659/allowed-material-in-the-exam</link>
				<description></description>
				<pubDate>Tue, 28 Jan 2020 13:18:35 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Just to make sure:<br /> &quot;You can use and written material&quot; - does this include &quot;printed material&quot;?</p> <p>Thanks</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12987269</guid>
				<title>Exam location</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12987269/exam-location</link>
				<description></description>
				<pubDate>Tue, 28 Jan 2020 05:44:00 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Where will the exam be held?</p> <p>Thanks</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12986131</guid>
				<title>Lecture 12 questions</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12986131/lecture-12-questions</link>
				<description></description>
				<pubDate>Mon, 27 Jan 2020 22:19:27 +0000</pubDate>
				<wikidot:authorName>AvivB</wikidot:authorName>				<wikidot:authorUserId>5908253</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Hi,<br /> I have some question regarding Lecture 12:</p> <p>1. Page 1, Adaptive Zero Knowledge: Can you please give a description of the distribution behind the Real and the Ideal worlds? maybe in an ensemble notation?<br /> 2. Page 3, Within the Decrypt of the CCA scheme: Don't we need to append to SK' the CRS? Because it has to verify that the NIZK is correct, and the verifier of the NIZK needs the CRS.<br /> 3. Page 3, Claim 2.2: What does it mean a &quot;sequence of hybrid games&quot; - How does the distribution of game look like? And why does it imply that we can replace one game with another?<br /> 4.Page 3, Game1: It seems that we assumed NIZK, but we are using the two simulators which are part of the Adaptive NIZK ZK.<br /> Do we assume NIZK and transform it into an adaptive NIZK (although the proof for it will come later on the lecture) as stated that can be done?<br /> (The same question goes for Definition 2.3 which also assumed NIZK but used the adaptive ZK).<br /> 5. Page 4, Game4: In line 2, do we intentionally moved back to decrypting with sk0, If so - why is that?<br /> 6. A General question: In most of the NIZK ZK definitions we used an ensemble notation, but we didn't mention the security parameter n.<br /> Does it have some meaning? or n is that obvious that it is omitted? (If n shouldn't be there - on what parameter is the bounding negligible function?)</p> <p>Thanks, and sorry for the long questions.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12980274</guid>
				<title>Lecture 5 - multi message encryption</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12980274/lecture-5-multi-message-encryption</link>
				<description></description>
				<pubDate>Sun, 26 Jan 2020 12:23:13 +0000</pubDate>
				<wikidot:authorName>amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>In lecture 4 it is said:</p> <p>&quot;Note on Randomized Encryption. Note that the constructed encryption scheme is randomized. In fact, any stateless encryption scheme for more than a single message must be randomized (<strong>think why)</strong>.&quot;</p> <p>The answer is that if it is not randomized, an attacker can distinguish between encryption of (m_0,m_0,m_0) to encryption of (m_0,m_0,m_1), since in the first all the 3 will always be the same and in the second not?</p> <p>If not, what is the answer?</p> <p>Thanks!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12976568</guid>
				<title>notes from Extra lecture</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12976568/notes-from-extra-lecture</link>
				<description></description>
				<pubDate>Sat, 25 Jan 2020 11:53:39 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Hey,<br /> Is there an option to upload the notes from the extra (העשרה) class from Friday?</p> <p>Thanks</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12960986</guid>
				<title>Lecture 11</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12960986/lecture-11</link>
				<description></description>
				<pubDate>Wed, 22 Jan 2020 11:35:14 +0000</pubDate>
				<wikidot:authorName>Guest</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Hi!</p> <p>Regarding lecture 11, I didn't manage to understand the impossibility mentioned in the beginning of page 2, i.e. why in the NIZK model with crs, the simulator will not decide the language like in claim 2.1?</p> <p>Thanks</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12950662</guid>
				<title>HW5, Q2</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12950662/hw5-q2</link>
				<description></description>
				<pubDate>Mon, 20 Jan 2020 14:57:27 +0000</pubDate>
				<wikidot:authorName>shelly</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>hi, i have some questions regarding question 2:</p> <p>2. For the function we defined in question 2 for auction, what happens in a situation where an adversary controls the seller? If the seller is corrupted then the adversary can decide who wins because it can choose for the seller the final output to be (B, some random number). Nobody really checks that this random number is the real bid of B, thus the adversary can make B win even in the ideal world.</p> <p>3. The logic of section A: I did not understand how it is possible that A* outputs b. By the definition of the function, the output of A should be nothing, so if A* outputs b, it contradicts the definition of the function.</p> <p>Thanks!!</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-12949707</guid>
				<title>HW5, Q2</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-12949707/hw5-q2</link>
				<description></description>
				<pubDate>Mon, 20 Jan 2020 09:56:45 +0000</pubDate>
				<wikidot:authorName>AvivB</wikidot:authorName>				<wikidot:authorUserId>5908253</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Hi,<br /> I'm a bit confused with the definition of an ensemble with multi-variable.<br /> By the definition of:</p> <span class="equation-number">(1)</span> <div class="math-equation" id="equation-746627-1">\begin{align} \left \{ Real(n,C,x) \right \}_{n,C,x}\approx _C \left \{ Ideal(n,C,x) \right \}_{n,C,x} \end{align}</div> <p>- Do we fix C and x, and bound the distance term with a function of n?<br /> - Does the distinguisher know C or x?<br /> - In lecture 2 we defined Computational Indistinguishablity and we defined I_n . Does the group I_n contains every C and x of length n?</p> <p>I'm asking it because I can't find a way to distinguish between the Real-world and the Ideal-world given only y_S,y_A,y_B,y_C (assuming A*'s ability to outputs b with non-negligible probability).</p> 
				 	]]>
				</content:encoded>							</item>
				</channel>
</rss>