Questions tagged [game]
20 questions
4
votes
1 answer
Hiding/Obscuring position information in a board game
There has been a question on the BoardGameGeek forums that basically boils down to this:
There is a player character on a regular rectangle map at position (px,py).
There is one "AI" character that moves across this map according to some function…
fho
- 161
- 5
4
votes
1 answer
Origin of "abort" in cryptography proofs
It's a very standard move in a game-based security proof to have a transition in which we "abort" on some event such as a hash collision; the two games are identical apart from the abort step, and we add the probability of the abort to the advantage…
Paul Crowley
- 247
- 1
- 10
4
votes
0 answers
"Simulator Based" vs "Game Based" security proof for a two-party computation protocol
I am trying to find out how to write a security proof for a two-party computation problem.
I have read some examples to write simulators like $x_1 ∧ x_2$ problem and the example in Goldreich's book. I have also read some parts of Lindell's toturial…
m123
- 293
- 3
- 9
4
votes
1 answer
sUF-CMA security of Lyubashevsky's ID and signature protocol
I have been working on the post-quantum safe ID/signature-schemes of Vadim Lyubashevsky (https://www.iacr.org/archive/asiacrypt2009/59120596/59120596.pdf).
I am in particular studying the security proof, and wanting to structure this in a game based…
Rory
- 353
- 2
- 12
3
votes
1 answer
How to bound the advantage of the following pair of games?
I'm reading a paper Code-Based Game-Playing Proofs and the Security of Triple Encryption, and I encounter a question in section 4.3, which designs the following games:
Lets just focus on the medium two pairs of games, $R_1/C_1$ and $R_2/C_T$. $R_1$…
Ji Li
- 137
- 8
2
votes
1 answer
Hiding/Obscuring position information in a board game (Part 2)
This is basically a follow-up question to Hiding/Obscuring position information in a board game which technically answered the question, but raised some well deserved critique.
To quickly summarize the question: Consider a board game with a…
fho
- 161
- 5
2
votes
0 answers
Does the PRG game allow for bad randomness picks?
In the game-based definition, we say that $G: \{ 0, 1 \}^n \rightarrow \{ 0, 1 \}^{\ell(n)}$ is a pseudorandom generator if For all ppt distinguishers $D$, there exists a negligible function $\nu$ such that: $$Pr[D( r) = 1] - Pr[D(G(s)) = 1 ] \leq…
eternalmothra
- 395
- 4
- 11
2
votes
1 answer
Proving semantic security implies security from key-recovery attack
I am working on problem 2.11 from the book: A Graduate Course in Applied Cryptography by Dan Boneh and Victor Shoup. The problem reads as follows:
Problem 2.11: Let $\mathcal{E} = (E, D)$ be a cipher defined over $(\mathcal{K}, \mathcal{M},…
Tom Finet
- 125
- 5
1
vote
1 answer
What exactly is a game, challenger, and adversary?
Here is my understanding of the concept of security games. I bolded some parts that I am not sure about.
A cryptographic object is formally defined by its algorithms and what security notions it achieves. Such notions capture an adversary’s power…
eternalmothra
- 395
- 4
- 11
1
vote
0 answers
Building an Adversary for a PRF game
Here is the game:
How can I make an $\mathcal{O}(k^2)$-time adversary making only one query to its Fn oracle and achieving advantage $= 1 - 1/(p-1)$
Here is my idea so far:
query $2^{-1}$, which when it goes through the Encryption algorithm, will…
Diego Starr
- 21
- 1
1
vote
1 answer
How are probabilities combined in the game hopping proof technique?
I'm currently studying a paper (Sequences of Games: A Tool for Taming Complexity in Security Proofs) on proving semantic security using the Game Hopping technique by Victor Shoup.
On pages 9-11, he is using a sequence of three games, $Game 1$, $Game…
tur11ng
- 992
- 5
- 22
1
vote
0 answers
Algorithmic game theory and protocol design for communication
There is a field of exchanging information that combines cryptography and game theory. I am interested in understanding this field, but it's a little complex for me. To begin with there is a paper of Barany which shows that instead of having a…
Hunger Learn
- 279
- 1
- 10
1
vote
1 answer
An upper bound for advantage in a security game
Suppose I have defined a security game in a private-key (symmetric) encryption scheme.
Remark: Note that encryption algorithm is probabilistic, so for a specific message m, $Enc_k(m)$ might output a different ciphertext when
runs multiple times,…
EddyLiu
- 75
- 4
1
vote
1 answer
Proof that semantic security implies key-recovery security
I'm trying to prove that semantic security implies key-recovery security.
There is already a question that addresses this, but it doesn't explain the setup of the security reduction, which is what I'm interested in.
My idea is as follows:
Given an…
cmplx96
- 113
- 3
1
vote
0 answers
Proving 2-way nesting security
I recently came across the theorem about $n$-way nesting. It states that if $\mathcal{E}=(E, D)$ is semantically secure, then $\mathcal{E}$ is secure for $n$-way nesting. I'm trying to prove the specific case of $n=2$. For the encryption…
libre
- 21
- 1