Alice encrypts her data using her public key pk and stores


Alice encrypts her data using her public key PK and stores the encrypted data in the cloud. Which of the following attack scenarios will compromise the privacy of her data?

  1. Hacker Harry breaks into the cloud server and steals the encrypted data
  2. Alice also stores her private key in the cloud, and Harry breaks into the cloud server as before
  3. Agent Andrew subpoenas Alice, forcing her to reveal her private key. However, the cloud server successfully resists to access the stored data
  4. None of these scenarios compromise the privacy of Alice's data

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Alice encrypts her data using her public key pk and stores
Reference No:- TGS02756014

Now Priced at $20 (50% Discount)

Recommended (92%)

Rated (4.4/5)