Quantcast
Channel: User Command Master - Cryptography Stack Exchange
Browsing latest articles
Browse All 21 View Live

Comment by Command Master on Why don't basically all "clusters" and similar...

Shamir's secret sharing is provably information-theoretically secure — even an unbounded adversary can't learn anything about the secret if he doesn't have enough shares

View Article



Comment by Command Master on A semantically secure encryption scheme can not...

@kelalaka The definition I know of semantic security requires $|m_1| = |m_2|$, otherwise the length of the output can't be bounded by a polynomial (because if it was you could encrypt $0$ and a random...

View Article

Comment by Command Master on Homomorphic encryption with multiple keys that...

If the key of $f\cdot g$ is compromised and the attack knows a message encrypted with $f, g$ then he can decrypt messages. It might be possible to hide the keys themselves, but you still get a total break

View Article

Comment by Command Master on Secret sharing scheme which cannot tell fake...

@Mikero it doesn't - you can't tell the real shares, so you couldn't recover it from the array

View Article

Comment by Command Master on Is F(k,k) $\oplus$ F(k,x) a pseudorandom...

If you randomly choose a value $r$ and then look at $G(x) = \hat{F}(k, r) \oplus \hat{F}(k, x)$, what happens?

View Article


Comment by Command Master on Where are TRNGs an absolute need?

Could you clarify what you mean by "a long running prejudice on this site towards OTPs"?

View Article

Comment by Command Master on Detecting Cheaters in a Secret Sharing Scheme...

You can try using a Reed—Solomon decoding algorithm, perhaps some can incorporate the knowledge of $m$.

View Article

How big does M need to be in Blum Blum Shub?

I've read that Blum Blum Shub is a CSPRNG, defined by $x_{n+1} = x_n^2 \bmod M$. I didn't understand that, and couldn't find any sources on how big $M$ should be.Are 32 bits enough? 64 bits? Or are...

View Article


Answer by Command Master for Homomorphic encryption with multiple keys that...

If an attacker has the key of $f\cdot g$, then assuming he knows some pair $x, f(x)$, he can decrypt messages encrypted with $g$ - he can use the homomorphism to calculate $f(x) \cdot g(y) = f\cdot...

View Article


Answer by Command Master for Is it possible: delayed secure hamming distance

If you can have multiple servers of which at least one isn't compromised this is possible, using something similar to function secret sharing.Let's say there are $n$ bits. Alice would share each of her...

View Article

Comment by Command Master on One-way permutation over a small interval?

Showing that a function is invertible usually requires either to explicitly exhibit an inverse, and I'm not aware of any case where that inverse wouldn't be polynomial, or for it to be mathematically...

View Article

Comment by Command Master on How often do hard-to-factor numbers occur?

This seems more like a question in number theory than cryptography, how many semiprimes are there in some range whose smallest factor is bigger than some bound and the factors aren't too close. Are...

View Article

Comment by Command Master on Using Shamir secret sharing algorithm for strings

The second method stops the secret sharing from being information theoretically secure (which is a property of Shamir's algorithm).

View Article


Comment by Command Master on How do I generate a sequence of numbers with...

@fgrieu as I read the question the adversary actually knows $V$. But it is indeed unclear if the list is the input or we only need to find an order for $[0, 2^b)$

View Article

Comment by Command Master on Why is zero knowledge defined via simulation...

Have you tried looking at examples of simulators for classic zero knowledge problems (proving quadratic residuosity of some number, for example)? I think it could help with intuition for what this...

View Article

Browsing latest articles
Browse All 21 View Live




Latest Images