Introduction Passive Soundness Adaptive Soundness Selective Decryption Conclusion

De
Publié par

logo Introduction Passive Soundness Adaptive Soundness Selective Decryption Conclusion Adaptive Security of Symbolic Encryption: the Case of Dynamic Corruptions. Laurent Mazaré Joint work with Bogdan Warinschi LSV - ENS Cachan Formacrypt Metting, January 2007 L. Mazaré Adaptive Security with Dynamic Corruptions 1/20

  • symbolic model

  • decryption conclusion

  • mazaré adaptive

  • introduction passive

  • computational security

  • adaptive adversaries

  • soundness selective

  • soundness adaptive


Publié le : mardi 19 juin 2012
Lecture(s) : 30
Source : di.ens.fr
Nombre de pages : 59
Voir plus Voir moins
IntroductioPnsaisevoSnundsedasAivptoueSnendeSsstcelDeviyrcenConptioionclustpadAérazaM.LhDitywitureceSiv2/1s
Adaptive Security of Symbolic Encryption: the Case of Dynamic Corruptions.
logo
0
Laurent Mazaré Joint work with Bogdan Warinschi
LSV - ENS Cachan
Formacrypt Metting, January 2007
amynCoicuprronti
nIrtssendnuoevitpadAontiucodeSivssParcpyeveDoCcnitnodnesSounectisSelondortitcuisulnInoytiruceSevitpadAruorcCminaDythwizaréL.Ma02
logo
Adversary Model 1Passive adversary: eavesdropper. 2Adaptive adversaries. 3Active adversaries.
Computational soundness of symbolic encryption SymbolicsecurityComputationalsecurity.
Symbolic and Computational Settings 1Symbolicmodel: automatic verification. 2Computationalmodel: realism.
tpoisn/2
razaM.LAéadtpviSecerutiywithDynamicCorritpu2sno02/
Symbolic and Computational Settings 1Symbolicmodel: automatic verification. 2Computationalmodel: realism.
Adversary Model 1Passive adversary: eavesdropper. 2Adaptive adversaries. 3Active adversaries.
Computational soundness of symbolic encryption SymbolicsecurityComputationalsecurity.
logo
ndseoSnutpviAsadctiorodusivenPastnIoinclusionIntroductDeviyrceoitpnoCnoueSnendSessctle
InnoitucodtrInonsiluncdAssitpauoSeendnPaonivssodtrtiucpyitnooCiteveDrcessSelecveSoundnSevericuAdrétiapimanroCciwytyDht.LaMazoisnurtp
logo
Adversary Model 1Passive adversary: eavesdropper. 2Adaptive adversaries. 3Active adversaries.
Computational soundness of symbolic encryption SymbolicsecurityComputationalsecurity.
/202
Symbolic and Computational Settings 1Symbolicmodel: automatic verification. 2Computationalmodel: realism.
ortntcudPnoiissaSovednunsAesptdaISecerutiAéadtpviL.MazareructunStrusioonclCnoitpyrceDevitcleSessnendoueSiv
Passive Soundness
Selective Decryption
1
s3ontiup
2
3
logo
Adaptive Soundness
0/2nyDhtiwyrroCcima
ssgasenaDddecuittionConclusionMesonaM.LérazAdaptiveSecurityiwhtyDanimCcrour4/nsiopt
EE``m(1m1E,m`2m)2(P)EE``m{E`k E`{Em`}kmE`k(Déc) m}k(Ch)
Messages Messagesare defined by the following grammar:
Dolev-Yao Deduction System Messagemis deducible from the set of messagesE,E`mif:
Em`mE(Ax)E`E(m`1m,1m2)(Pr1)E`E(m`1m,2m2)(Pr2)
logo
20
msg::= (msg,msg)| {msg}k|k|0|1
sSelectiveDecrypdApaitevoSnundsessPaeSivndoussnertnIcudonoit
logo
Dolev-Yao Deduction System Messagemis deducible from the set of messagesE,E`mif:
Em`Em(Ax)E`E(m`1m,1m2)(Pr1)E`E(m`1m,2m2)(Pr2)
E`m1E`m2E`k E`(m1,m2)(P)EE``m{m}k(Ch)E`{mE}`kEm`k(Déc)
Messages Messagesare defined by the following grammar:
msg::= (msg,msg)| {msg}k|k|0|1
ions4/20tiypcrDevetiecelSssendnuoSevitpassAdndneeSoussivnoaPcuitrtdonIseductionagesandDisnoeMssnooCcnulucirytiwpaiteveScCorruptthDynamizaMaAdréL.
logo
Equivalence n= ({{1,1}k0}k,k) mandnare indistinguishable.
Pattern m= ({{0,0}k}k,k) Pattern: accessible information.
ions5/20cCorruptimanyDhtiwytirucSevetiapAdrézaMa.L0yrceoitpnoCnsulcnAioesccblsinfeiroamitnorfmomasesagedurontInuoSevissaPnoitceSouptivsAdadnesviDeeltcsseSdnen
sAesptdaeSivndouPnoiissaoSevndnuIntroduct
Equivalence n= ({{1,1}k0}k,k) mandnare indistinguishable.
Pattern m= ({{0,0}k}k,k) Pattern: accessible information.
ytirhtiwanyDCcimruoriopt5/ns
logo
20.LaMAdapzaréSecutivege0nforbleiessinAccseasmomanorfamiteceDivctleSessneoisulcnoCnoitpyr
L.Maza0oisnurtp
logo
Equivalence n= ({{1,1}k}k,k) mandnare indistinguishable.
Pattern m= ({{0,0}k}k,k) Pattern: accessible information.
/502DythwityorcCminaitpadAériruceSevtnIoitcudorvesiasnPesdnunSousclnAioioptonnCfnieamrosecclbiseSoundnesAdaptivviDeceyrsseSeltc0sageamesfromtion
aPssitnodocunIrtuodnviSedApaenssSountivesSeldneseDevitcenoitpyrcsiluncCossceAconbielniofmrtaoifnromamessage00azaréAdaL.MrutiwytitpviSecerrCotiupynhDicam
Equivalence n= ({{1,1}k}k,k) mandnare indistinguishable.
Pattern m= ({{0,0}k}k,k) Pattern: accessible information.
logo
5sno02/
Soyez le premier à déposer un commentaire !

17/1000 caractères maximum.