22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The distribution D 6 . This distribution is obtained from D 5 by producing crs (0) and π ∗ (where<br />

c ∗ = (c ∗ 0 , c∗ 1 , π∗ )) using the algorithms CRSGen (0) and P (0) , respectively (and not by using the<br />

simulator of the NIZK proof system Π (0) as in D 5 ).<br />

The distribution D 7 . This is the distribution Real CPA<br />

Π ′ ,A,t,r,q .<br />

Before proving that the above distributions are computationally indistinguishable, we first prove<br />

that S 2 fails to produce a certification chain with all but a negligible probability.<br />

Lemma 4.2. In distributions D 1 , . . . , D 6 , whenever A 2 outputs a valid ciphertext, S 2 generates a<br />

certification chain with all but a negligible probability.<br />

Proof. Assume towards a contradictions that in one of D 1 , . . . , D 6 with a non-negligible probability<br />

it holds that A 2 outputs a valid ciphertext but S 2 fails to generate a certification chain. In particular,<br />

there exists an index i ∈ {1, .(<br />

. . , t} for which with a non-negligible probability A 2 outputs a valid<br />

ciphertext of the form c (i) = i, c (i)<br />

0 , c(i) 1<br />

), , π(i) but S 2 fails to generate a certification chain. Recall<br />

that for generating a certification chain starting with c (i) , the simulator S 2 attempts to invoke<br />

i knowledge extractors (until the first failure occurs) that we denote by Ext (i) , . . . , Ext (1) . These<br />

knowledge extractors correspond to the malicious provers described in the description of S 2 for the<br />

argument systems Π (i) , . . . , Π (1) , respectively. Then, there exists an index j ∈ {1, . . . , i} for which<br />

with a non-negligible probability S 2 is successful with Ext (i) , . . . , Ext (j+1) but fails with Ext (j) .<br />

( The fact that S 2 is successful with Ext (j+1) implies that it produces a valid ciphertext c (j) =<br />

j, c (j)<br />

0 , c(j) 1<br />

). , π(j) In particular, it holds that<br />

V (j) (( pk 0 , pk 1 , c (j)<br />

0 , c(j) 1 , crs(j−1) , . . . , crs (0)) , π (j) , crs (j)) = 1 .<br />

Now, the fact that with a non-negligible probability S 2 fails with Ext (j) immediately translates to a<br />

malicious prover that contradicts the knowledge extraction property of the argument system Π (j) .<br />

We now prove that for every i ∈ {1, . . . , 6} the distributions D i and D i+1 are computationally<br />

indistinguishable.<br />

Lemma 4.3. The distributions D 1 and D 2 are computationally indistinguishable.<br />

Proof. Whenever A 2 outputs an invalid ciphertext, or outputs a valid ciphertext and S 2 generates<br />

a certification chain, the distributions D 1 and D 2 are identical. Indeed, in such a case the perfect<br />

decryption property guarantees that Dec ′ (<br />

sk c<br />

(i) ) = f ( m (0)) . Therefore, D 1 and D 2 differ only<br />

when when A 2 outputs a valid ciphertext but S 2 fails to generate a certification chain. Lemma 4.2<br />

guarantees that this event occurs with only a negligible probability.<br />

Lemma 4.4. The distributions D 2 and D 3 are computationally indistinguishable.<br />

Proof. This follows from the zero-knowledge property of Π (0) . Specifically, any efficient algorithm<br />

that distinguishes between D 2 and D 3 can be used (together with S) in a straightforward manner<br />

to contradict the zero-knowledge property of Π (0) .<br />

Lemma 4.5. The distributions D 3 and D 4 are computationally indistinguishable.<br />

17<br />

3. Targeted Malleability

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!