Computational Soundness of Observational Equivalence

被引:0
作者
Comon-Lundh, Hubert [1 ]
Cortier, Veronique [1 ]
机构
[1] AIST, Res Ctr Informat Secur & ENS Cachan, Tokyo, Japan
来源
CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2008年
关键词
Verification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many security properties are naturally expressed as indistinguishability between two versions of a protocol. In this paper, we show that, computational proofs of indistinguishability can be considerably simplified, for a class of processes that covers most existing protocols. More precisely, we show a soundness theorem, following the line of research launched by Abadi and Rogaway in 2000: computational indistinguishability in presence of all active attacker is implied by the observational equivalence of the corresponding symbolic processes. We prove our result. for symmetric encryption, but the same techniques call be applied to other security primitives such as signatures and public-key encryption. The proof requires the introduction of new concepts, which are general and call be reused ill other settings.
引用
收藏
页码:109 / 118
页数:10
相关论文
共 33 条
[1]  
ABADI M, 2001, P 28 ACM S PRINC PRO, P104, DOI DOI 10.1145/373243.360213
[2]  
ABADI M, 2001, LNCS, V2215
[3]  
ABADI M, 2007, J CRYPTOLOGY
[4]  
Abadi M, 2006, LECT NOTES COMPUT SC, V3921, P398
[5]  
Abdalla M, 2004, LECT NOTES COMPUT SC, V3269, P1
[6]  
ADAO P, 2006, INT C ALG LANG PROGR
[7]   Relating symbolic and cryptographic secrecy [J].
Backes, M ;
Pfitzmann, B .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :171-182
[8]  
BACKES M, 2004, COMP SEC FDN WORKSH
[9]  
BACKES M, 2007, LNCS, V4855
[10]  
Backes M., 2003, 10 ACM C COMP COMM S