MIT - CSAIL - TR - 2008 - 068 November 22 , 2008 Modeling Computational Security in Long - Lived Systems
نویسندگان
چکیده
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., super-polynomial). In such cases, security cannot be guaranteed in the traditional sense: a computationally secure protocol may become insecure if the attacker has a super-polynomial number of interactions with the protocol. This paper proposes a new paradigm for the analysis of long-lived security protocols. We allow entities to be active for a potentially unbounded amount of real time, provided they perform only a polynomial amount of work per unit of real time. Moreover, the space used by these entities is allocated dynamically and must be polynomially bounded. We propose a new notion of long-term implementation, which is an adaptation of computational indistinguishability to the long-lived setting. We show that long-term implementation is preserved under polynomial parallel composition and exponential sequential composition. We illustrate the use of this new paradigm by analyzing some security properties of the long-lived timestamping protocol of Haber and Kamat.
منابع مشابه
Modeling Computational Security in Long-Lived Systems, Version 2
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...
متن کاملTesting Linear-Invariant Non-Linear Properties
We consider the task of testing properties of Boolean functions that are invariant under linear transformations of the Boolean cube. Previous work in property testing, including the linearity test and the test for Reed-Muller codes, has mostly focused on such tasks for linear properties. The one exception is a test due to Green for “triangle freeness”: a function f : {0, 1}n → {0, 1} satisfies ...
متن کاملModeling Computational Security in Long-Lived Systems
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...
متن کامل4th German Conference on Chemoinformatics: 22. CIC-Workshop. November 9–11, 2008, Goslar, Germany
From the 9th to the 11th November 2008, the ChemistryInformation-Computers (CIC) division of the German Chemical Society (GDCh) has invited the chemoinformatics and modeling community to Goslar, Germany to participate in the 4th German Conference on Chemoinformatics (GCC). Almost 200 participants from 14 countries accepted the invitation making the event again one of the largest chemoinformatic...
متن کاملBreaking the ǫ-Soundness Bound of the Linearity Test over GF(2)
For Boolean functions that are ǫ-far from the set of linear functions, we study the lower bound on the rejection probability (denoted by rej(ǫ)) of the linearity test suggested by Blum, Luby and Rubinfeld. This problem is arguably the most fundamental and extensively studied problem in property testing of Boolean functions. The previously best bounds for rej(ǫ) were obtained by Bellare, Coppers...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008