A Calculus for Game-Based Security Proofs

被引:0
|
作者
Nowak, David [1 ]
Zhang, Yu [2 ]
机构
[1] AIST, Res Ctr Informat Secur, Tokyo, Japan
[2] Chinese Acad Sci, Inst Software, Beijing, Peoples R China
来源
PROVABLE SECURITY | 2010年 / 6402卷
关键词
game-based proofs; implicit complexity; computational in-distinguishability; COMPUTATION; NOTIONS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The game-based approach to security proofs in cryptography is a widely-used methodology for writing proofs rigorously. However a unifying language for writing games is still missing. In this paper we show how CSLR, a probabilistic lambda-calculus with a type system that guarantees that computations are probabilistic polynomial time, can be equipped with a notion of game indistinguishability. This allows us to define cryptographic constructions, effective adversaries, security notions, computational assumptions, game transformations, and game-based security proofs in the unified framework provided by CSLR. Our code for cryptographic constructions is close to implementation in the sense that we do not assume arbitrary uniform distributions but use a realistic algorithm to approximate them. We illustrate our calculus on cryptographic constructions for public-key encryption and pseudorandom bit generation.
引用
收藏
页码:35 / +
页数:3
相关论文
共 50 条
  • [1] A framework for game-based security proofs
    Nowak, David
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 319 - 333
  • [2] Game-Based Automated Security Proofs for Cryptographic Protocols
    Gu Chunxiang
    Guang Yan
    Zhu Yuefei
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 50 - 57
  • [3] Game-Based Security Proofs for Secret Sharing Schemes
    Xia, Zhe
    Yang, Zhen
    Xiong, Shengwu
    Hsu, Ching-Fang
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 650 - 660
  • [4] Game-based security proofs for verifiable secret sharing schemes in the standard model
    Mashhadi, Samaneh
    [J]. INFORMATION SECURITY JOURNAL, 2023, 32 (03): : 163 - 172
  • [5] CryptHOL: Game-Based Proofs in Higher-Order Logic
    Basin, David A.
    Lochbihler, Andreas
    Sefidgar, S. Reza
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (02) : 494 - 566
  • [6] CryptHOL: Game-Based Proofs in Higher-Order Logic
    David A. Basin
    Andreas Lochbihler
    S. Reza Sefidgar
    [J]. Journal of Cryptology, 2020, 33 : 494 - 566
  • [7] Understanding Game-Based Privacy Proofs for Energy Consumption Aggregation Protocols
    Unterweger, Andreas
    Taheri-Boshrooyeh, Sanaz
    Eibl, Gunther
    Knirsch, Fabian
    Kupcu, Alptekin
    Engel, Dominik
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) : 5514 - 5523
  • [8] A Probabilistic Hoare-style logic for game-based cryptographic proofs
    Gorin, Ricardo
    den Hartog, Jerry
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 252 - 263
  • [9] Calculus of Cooperation and Game-Based Reasoning about Protocol Privacy
    More, Sara Miner
    Naumov, Pavel
    [J]. ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2012, 13 (03)
  • [10] Game-Based Adaptive Security in the Internet of Things for eHealth
    Hamdi, Mohamed
    Abie, Habtamu
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 920 - 925