New approaches to formalizing security Seminar report for Research Seminar in Cryptography
نویسندگان
چکیده
Recently the frameworks of abstract and constructive cryptography have been proposed by Maurer et al [MR11, Mau11, Mau10, Mau09]. These aim to redefine the common view of cryptographic security proofs and definitions. However, in a sense these ideas can be seen both as a protest and a generalisation of the current state of the art. First, a protest because current definitions and proofs are built from the very low details of the computation model, such as the Turing machine, but often rely on the general understanding of these models rather than actual details. These make the corresponding results less formal than we could desire. Secondly, a generalisation because an important observation behind the abstract cryptography is that different specification of low level details may still lead to more or less equivalent high level results. Hence, maybe it is actually reasonable to enable well formalised cryptographic arguments on a higher abstraction level to achieve general results that apply for all lower level specifications. This work is mostly based on the theory of abstract cryptography [MR11] and also uses the constructive cryptography [Mau10, Mau11] which is an application of abstract cryptography. This overview is intended to introduce these theories and offer some additional comments and insights. In addition, additional examples are given for the numerous definitions, that hopefully make understanding these ideas simpler. Firstly, Section 2 recalls some of the main challenges of cryptographic protocol design and uses them as motivation for the abstract and constructive cryptography frameworks. Secondly, Section 3 gives an overview of the abstract cryptography definitions with several examples of the introduced concepts. Section 4 continues the discussion about abstract cryptography by introducing some examples of using this theory as well as highlighting some open questions. Following Section 5 gives a subcase of abstract cryptography called the constructive cryptography. Finally, Section 6 concludes this report.
منابع مشابه
Privacy-oriented Cryptography 1 Executive Summary Creative Commons By-nc-nd 3.0 Unported License
This report documents the program of the Dagstuhl Seminar 12381 “Privacy-Oriented Cryptography”, which took place at Schloss Dagstuhl in September 16-21, 2012. Being the first Dagstuhl seminar that explicitly aimed to combine cryptography and privacy research communities, it attracted a high number of participants, many of whom were new to Dagstuhl. In total, the seminar was attended by 39 inte...
متن کاملDagstuhl Seminar 06371 “From Security to Dependability”
This seminar brought together researchers and practitioners from the different areas of dependability and security, in particular, from fault-tolerance, safety, distributed computing, langelanguage-based security, and cryptography. The aim was to discuss common problems faced by research in these areas, the differences in their respective approaches, and to identify research challenges in this ...
متن کاملModern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051)
This report documents the program and the outcomes of Dagstuhl Seminar 16051 “Modern Cryptography and Security: An Inter-Community Dialogue”. Seminar January 31 to February 5, 2016 – http://www.dagstuhl.de/16051 1998 ACM Subject Classification E.3 Data Encryption, K.6.5 Security and Protection
متن کامل14021 Symmetric Cryptography
From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...
متن کاملRandomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031)
From 05.01.2014 to 10.01.2014, the Seminar 14021 in Symmetric Cryptography was held in Schloss Dagstuhl – Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013