Implicit Computational Complexity of Subrecursive Definitions and Applications to Cryptographic Proofs

被引:0
作者
Patrick Baillot
Gilles Barthe
Ugo Dal Lago
机构
[1] Univ Lyon,
[2] CNRS,undefined
[3] EnsL,undefined
[4] UCBL,undefined
[5] LIP,undefined
[6] IMDEA Software Institute,undefined
[7] Università di Bologna,undefined
[8] INRIA,undefined
来源
Journal of Automated Reasoning | 2019年 / 63卷
关键词
Implicit computational complexity; Complexity analysis; Linear dependent types; Cryptographic proofs;
D O I
暂无
中图分类号
学科分类号
摘要
We define a call-by-value variant of Gödel’s system T\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {T} $$\end{document} with references, and equip it with a linear dependent type and effect system, called dℓT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {d}\ell \textsf {T} $$\end{document}, that can estimate the time complexity of programs, as a function of the size of their inputs. We prove that the type system is intentionally sound, in the sense that it over-approximates the complexity of executing the programs on a variant of the CEK abstract machine. Moreover, we define a sound and complete type inference algorithm which critically exploits the subrecursive nature of dℓT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {d}\ell \textsf {T} $$\end{document}. Finally, we demonstrate the usefulness of dℓT\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textsf {d}\ell \textsf {T} $$\end{document} for analyzing the complexity of cryptographic reductions by providing an upper bound for the constructed adversary of the Goldreich–Levin theorem.
引用
收藏
页码:813 / 855
页数:42
相关论文
共 24 条
  • [1] Baillot P(2009)Light types for polynomial time computation in lambda calculus Inf. Comput. 207 41-62
  • [2] Terui K(2015)Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy ACM SIGPLAN Notices 50 55-68
  • [3] Barthe Gilles(2009)Formal certification of code-based cryptographic proofs ACM SIGPLAN Notices 44 90-8:38
  • [4] Gaboardi Marco(2009)The geometry of linear higher-order recursion ACM Trans. Comput. Log. 10 8:1-178
  • [5] Gallego Arias Emilio Jesús(2013)The geometry of types ACM SIGPLAN Notices 48 167-166
  • [6] Hsu Justin(2008)Lightweight semiformal time complexity analysis for purely functional data structures ACM SIGPLAN Notices 43 133-184
  • [7] Roth Aaron(2009)SPEED ACM SIGPLAN Notices 44 127-131
  • [8] Strub Pierre-Yves(2000)Safe recursion with higher types and BCK-algebra Ann. Pure Appl. Log. 104 113-undefined
  • [9] Barthe Gilles(2009)A flow calculus of mwp-bounds for complexity analysis ACM Trans. Comput. Log. 10 28-undefined
  • [10] Grégoire Benjamin(1993)Lambda calculus characterizations of poly-time Fundam. Inform. 19 167-undefined