Cryptographic reductions
نویسنده
چکیده
One of the main tools of cryptography are reductions. The simplest way to prove the security of a complex scheme based on the security of its constituents is to prove that if there exists an adversary that breaks the complex scheme then we can construct an adversary that breaks at least one of the constituent primitives. Since the security of the primitive is taken as a premise, this gives a contradiction and thus the scheme must be secure. However, since we want the scheme to work regardless of the actual primitives being used, we cannot make any assumptions about them other than them being efficient. This gives rise to so-called black-box reductions – we are assumed to be presented with a method of implementing the original primitive (the black box) and we can use it, but we have no idea on how it is constructed.
منابع مشابه
Efficiency Bounds for Adversary Constructions in Black-Box Reductions
We establish a framework for bounding the efficiency of cryptographic reductions in terms of their security transfer. While efficiency bounds for the reductions have been studied for about ten years, the main focus has been the efficiency of the construction mostly measured by the number of calls to the basic primitive by the constructed primitive. Our work focuses on the efficiency of the wrap...
متن کاملOn the Impossibility of Tight Cryptographic Reductions
The existence of tight reductions in cryptographic security proofs is an important question, motivated by the theoretical search for cryptosystems whose security guarantees are truly independent of adversarial behavior and the practical necessity of concrete security bounds for the theoretically-sound selection of cryptographic parameters. At Eurocrypt 2002, Coron described a meta-reduction tec...
متن کاملOn the Security Loss in Cryptographic Reductions
Almost all the important cryptographic protocols we have today base their security on unproven assumptions, which all imply NP 6= P, and thus having unconditional proofs of their security seems far beyond our reach. One research effort then is to identify more basic primitives and prove the security of these protocols by reductions to the security of these primitives. However, in doing so, one ...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملBlack-Box Reductions and Separations in Cryptography
Cryptographic constructions of one primitive or protocol from another one usually come with a reductionist security proof, in the sense that the reduction turns any adversary breaking the derived scheme into a successful adversary against the underlying scheme. Very often the reduction is black-box in the sense that it only looks at the input/output behavior of the adversary and of the underlyi...
متن کاملThe Exact Security of Pairing Based Encryption and Signature Schemes
Bilinear pairings have been intensively used in the design of cryptographic protocols during the last few years. For instance, short signatures and non-interactive key exchange protocols have been designed with them, and they appear as a key component for identity-based cryptography. Focusing on encryption and signature schemes built on bilinear pairings, we look at the security reductions of s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008