<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wikidot="http://www.wikidot.com/rss-namespace">

	<channel>
		<title>Exam F17 A question 2 a</title>
		<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a</link>
		<description>Posts in the discussion thread &quot;Exam F17 A question 2 a&quot;</description>
				<copyright></copyright>
		<lastBuildDate>Mon, 16 Mar 2026 02:05:31 +0000</lastBuildDate>
		
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486964</guid>
				<title>(no title)</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486964</link>
				<description></description>
				<pubDate>Sun, 02 Feb 2020 07:35:02 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>Yes. Note that given a public key <span class="math-inline">$pk$</span> sampling a matching secret key is at least as hard as breaking the encryption.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486947</guid>
				<title>(no title)</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486947</link>
				<description></description>
				<pubDate>Sun, 02 Feb 2020 07:15:49 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>Thanks!<br /> So if I generated a pair of (sk_1,pk) and you generated the pair (sk_2,pk), I will be able to decrypt messages that are sent to you with my secret key?</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486924</guid>
				<title>(no title)</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486924</link>
				<description></description>
				<pubDate>Sun, 02 Feb 2020 06:47:21 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>No, it doesn't. By the correctness of the scheme it must be decrypted under both keys to whichever message was encrypted.</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486559</guid>
				<title>(no title)</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486559</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 21:51:27 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>But doesn't it mean that a cipher text that was encrypted with the same public key can be decrypted to 2 different messages, based on the corresponding secret key?<br /> If so, then the commitment does not have to be binding, the fact that the public key is the same and the cipher text is the same does not mean that the message is the same ( I will be able to open the commitment to 2 different messages).</p> <p>What do I miss here?</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486246</guid>
				<title>Re: Exam F17 A question 2 a</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486246</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 14:24:30 +0000</pubDate>
				<wikidot:authorName>nbitansky</wikidot:authorName>				<wikidot:authorUserId>1746223</wikidot:authorUserId>				<content:encoded>
					<![CDATA[
						 <p>They don't have to be equal as strings, and the proof in the solution doesn't assume they are, it just invokes the perfect correctness guarantee. In particular, there exist public-key encryption schemes where a single public key may have many corresponding secret keys. As an uninteresting example you can always pad the key with bits that are ignored (there are also interesting examples&#8230;).</p> 
				 	]]>
				</content:encoded>							</item>
					<item>
				<guid>http://tau-foc-f19.wikidot.com/forum/t-13001365#post-4486162</guid>
				<title>Exam F17 A question 2 a</title>
				<link>http://tau-foc-f19.wikidot.com/forum/t-13001365/exam-f17-a-question-2-a#post-4486162</link>
				<description></description>
				<pubDate>Sat, 01 Feb 2020 12:47:18 +0000</pubDate>
				<wikidot:authorName>Amit</wikidot:authorName>								<content:encoded>
					<![CDATA[
						 <p>It sounds from the solution that if G created the same public key for 2 randomnesses then it must create the same public key.</p> <p>Is it correct? I could not convince myself that it is, but the solution is dependent on it if I understood correctly.</p> <p>Hope the question is clear, will write it more formally:<br /> if G generates secret and public keys for a public key encryption, and for randomness r_g it created (sk,pk), and for randomness r_g_2 it created (sk^', pk), does it mean that sk^' == sk?</p> <p>Otherwise I think there is a counter example for the solution described.</p> 
				 	]]>
				</content:encoded>							</item>
				</channel>
</rss>