Computational and information-theoretic soundness and completeness of formal encryption

被引:17
|
作者
Adao, P [1 ]
Bana, G [1 ]
Scedrov, A [1 ]
机构
[1] Ctr Log & Computat, IST, Lisbon, Portugal
关键词
D O I
10.1109/CSFW.2005.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider expansions of the Abadi-Rogaway logic of indistinguishability of formal cryptographic expressions. We expand the logic in order to cover cases when partial information of the encrypted plaintext is revealed. We consider not only computational, but also purely probabilistic, information-theoretic interpretations. We present a general, systematic treatment of the expansions of the logic for symmetric encryption. We establish general soundness and completeness theorems for the interpretations. We also present applications to specific settings not covered in earlier works: a purely probabilistic one based on One-Time Pad, and computational settings of the so-called type-2 (which-key revealing) and type-3 (which-key and length revealing) encryption schemes based on computational complexity.
引用
收藏
页码:170 / 184
页数:15
相关论文
共 50 条
  • [31] Information-Theoretic Adverbialism
    Gert, Joshua
    [J]. AUSTRALASIAN JOURNAL OF PHILOSOPHY, 2021, 99 (04) : 696 - 715
  • [32] Speed-Accuracy Tradeoff: A Formal Information-Theoretic Transmission Scheme (FITTS)
    Gori, Julien
    Rioul, Olivier
    Guiard, Yves
    [J]. ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 2018, 25 (05)
  • [33] The substantive impact of computers on philosophy - Prolegomena to a computational and information-theoretic metaphysics
    Dipert, RR
    [J]. METAPHILOSOPHY, 2002, 33 (1-2) : 146 - 157
  • [34] Soundness of formal encryption in the presence of key-cycles
    Adao, P
    Bana, G
    Herzog, J
    Scedrov, A
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 374 - 396
  • [35] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    [J]. 2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 19 - 19
  • [36] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (03) : 563 - 593
  • [37] Information-theoretic and set-theoretic similarity
    Cazzanti, Luca
    Gupta, Maya R.
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1836 - +
  • [38] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    [J]. 2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278
  • [39] Information-theoretic limits of control
    Touchette, H
    Lloyd, S
    [J]. PHYSICAL REVIEW LETTERS, 2000, 84 (06) : 1156 - 1159
  • [40] INFORMATION-THEORETIC VIEW OF CONTROL
    Roy, Prateep
    Cela, Arben
    Hamam, Yskandar
    [J]. ICINCO 2009: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS, VOL 3, 2009, : 5 - +