Key generation:
Encryption of \(m \in \mathbb{Z}_p^*\):
Decryption of \(c = (\gamma, \delta) \in (\mathbb{Z}_p^*)^2\):
Show that the ElGamal encryption and decryption functions are indeed each other's inverses.
\[ \gamma^{-a} \delta \equiv (\alpha^k)^{-a} m \beta^k \equiv m \alpha^{-ka} \alpha^{ak} \equiv m \alpha^{ak - ak} \equiv m \pmod{p} \]
Let \(p = 101\), \(\alpha = 2\), \(\beta = 14\) be the public key for the ElGamal cryptosystem, with \(a = 10\) being the private key. Encrypt the plaintext \(m = 10\) using \(k = 7\) as the random number, and then decrypt the resulting ciphertext.
Encryption:
Decryption:
\(k\) | \(a\) | \(s\) |
---|---|---|
101 | 0 | |
27 | 1 | |
3 | 20 | -3 |
1 | 7 | 4 |
2 | 6 | -11 |
1 | 1 | 15 |
Suppose that we use the same random number \(k\) to encrypt two distinct plaintexts \(m_1\) and \(m_2\). Can you reveal \(m_2\) if you know \(m_1\) and both ciphertexts?
Show that distinguishing ElGamal encryptions is equivalent to solving the decision Diffie-Hellman problem.
or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing