Implicit Computational Complexity of Subrecursive Definitions and Applications to Cryptographic Proofs

被引:0
|
作者
Patrick Baillot
Gilles Barthe
Ugo Dal Lago
机构
[1] Univ Lyon,
[2] CNRS,undefined
[3] EnsL,undefined
[4] UCBL,undefined
[5] LIP,undefined
[6] IMDEA Software Institute,undefined
[7] Università di Bologna,undefined
[8] INRIA,undefined
来源
关键词
Implicit computational complexity; Complexity analysis; Linear dependent types; Cryptographic proofs;
D O I
暂无
中图分类号
学科分类号
摘要
We define a call-by-value variant of Gödel’s system T\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {T} $$\end{document} with references, and equip it with a linear dependent type and effect system, called dℓT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {d}\ell \textsf {T} $$\end{document}, that can estimate the time complexity of programs, as a function of the size of their inputs. We prove that the type system is intentionally sound, in the sense that it over-approximates the complexity of executing the programs on a variant of the CEK abstract machine. Moreover, we define a sound and complete type inference algorithm which critically exploits the subrecursive nature of dℓT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {d}\ell \textsf {T} $$\end{document}. Finally, we demonstrate the usefulness of dℓT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {d}\ell \textsf {T} $$\end{document} for analyzing the complexity of cryptographic reductions by providing an upper bound for the constructed adversary of the Goldreich–Levin theorem.
引用
收藏
页码:813 / 855
页数:42
相关论文
共 50 条
  • [21] Shape Complexity in Metal Extrusion: Definitions, Classification, and Applications
    Sayyad Zahid Qamar
    Josiah Cherian Chekotu
    Majid Al-Maharbi
    Khurshid Alam
    Arabian Journal for Science and Engineering, 2019, 44 : 7371 - 7384
  • [22] Shape Complexity in Metal Extrusion: Definitions, Classification, and Applications
    Qamar, Sayyad Zahid
    Chekotu, Josiah Cherian
    Al-Maharbi, Majid
    Alam, Khurshid
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (09) : 7371 - 7384
  • [23] Data Mining Definitions and Applications for the Management of Production Complexity
    Schuh, Guenther
    Reinhart, Gunther
    Prote, Jan-Philipp
    Sauermann, Frederick
    Horsthofer, Julia
    Oppolzer, Florian
    Knoll, Dino
    52ND CIRP CONFERENCE ON MANUFACTURING SYSTEMS (CMS), 2019, 81 : 874 - 879
  • [24] PACKINGS OF GRAPHS AND APPLICATIONS TO COMPUTATIONAL COMPLEXITY
    BOLLOBAS, B
    ELDRIDGE, SE
    JOURNAL OF COMBINATORIAL THEORY SERIES B, 1978, 25 (02) : 105 - 124
  • [25] Computational complexity and applications of quantum algorithm
    Iriyama, S.
    Ohya, M.
    APPLIED MATHEMATICS AND COMPUTATION, 2012, 218 (16) : 8019 - 8028
  • [26] Implicit computational complexity for higher type functionals (Extended abstract)
    Leivant, D
    COMPUTER SCIENCE LOGIC, PROCEEDINGS, 2002, 2471 : 367 - 381
  • [27] Implicit computational complexity and the exponential time-space classes
    Caporaso, Salvatore
    Covino, Emanuele
    Gissi, Paolo
    Pani, Giovanni
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND INFORMATICS (TELE-INFO '07)/ 6TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (SIP '07), 2007, : 65 - +
  • [28] A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 595 - +
  • [29] Formally Verified Resource Bounds through Implicit Computational Complexity
    Rusch, Neea
    COMPANION PROCEEDINGS OF THE 2022 ACM SIGPLAN INTERNATIONAL CONFERENCE ON SYSTEMS, PROGRAMMING, LANGUAGES, AND APPLICATIONS: SOFTWARE FOR HUMANITY, SPLASH COMPANION 2022, 2022, : 17 - 20
  • [30] Generalised dynamic ordinals - Universal measures for implicit computational complexity
    Beckmann, Arnold
    Logic Colloquium '02, 2006, 27 : 48 - 74