Soundness of formal encryption in the presence of active adversaries

被引:0
|
作者
Micciancio, D [1 ]
Warinschi, B [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbitrary expressions built using encryption and concatenation operations. The method allows to express security properties and carry out proofs using a simple logic based language, where messages are represented by syntactic expressions, and does not require dealing with probability distributions or asymptotic notation explicitly. Still, we show that the method is sound, meaning that logic statements can be naturally interpreted in the computational setting in such a way that if a statement holds true for any abstract (symbolic) execution of the protocol in the presence of a Dolev-Yao adversary, then its computational interpretation is also correct in the standard computational model where the adversary is an arbitrary probabilistic polynomial time program. This is the first paper providing a simple framework for translating security proofs from the logic setting to the standard computational setting for the case of powerful active adversaries that have total control of the communication network.
引用
收藏
页码:133 / 151
页数:19
相关论文
共 50 条
  • [1] Completing the picture:: Soundness of formal encryption in the presence of active adversaries
    Janvier, R
    Lakhnech, Y
    Mazaré, L
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 172 - 185
  • [2] Soundness of digital signature in the presence of active adversaries
    Zhu Yu-na
    Wang Ya-di
    Han Ji-hong
    Zhang Chao
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1352 - +
  • [3] Soundness of formal encryption in the presence of key-cycles
    Adao, P
    Bana, G
    Herzog, J
    Scedrov, A
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 374 - 396
  • [4] Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
    Lei, Xinfeng
    Xue, Rui
    Yu, Ting
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 29 - +
  • [5] Computational soundness about formal encryption in the presence of bilinear pairings and key cycles
    Zhang, Fan
    Li, Zhoujun
    [J]. International Journal of Advancements in Computing Technology, 2012, 4 (21) : 507 - 516
  • [6] On the Soundness of Infrastructure Adversaries
    Dax, Alexander
    Kunnemann, Robert
    [J]. 2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 345 - 360
  • [7] Computational and information-theoretic soundness and completeness of formal encryption
    Adao, P
    Bana, G
    Scedrov, A
    [J]. 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 170 - 184
  • [8] Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*
    Martín Abadi
    Phillip Rogaway
    [J]. Journal of Cryptology, 2002, 15 : 103 - 127
  • [9] Reconciling two views of cryptography (The computational soundness of formal encryption)
    Abadi, M
    Rogaway, P
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 103 - 127
  • [10] Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
    Martin Abadi
    Phillip Rogaway
    [J]. Journal of Cryptology, 2007, 20 (3) : 395 - 395