...
首页> 外文期刊>Journal of computer security >Inductive trace properties for computational security
【24h】

Inductive trace properties for computational security

机译:归纳跟踪属性以确保计算安全

获取原文
获取原文并翻译 | 示例
           

摘要

Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protocol and adversary). Computational secrecy conditions, on the other hand, often are not trace based: the ability to computationally distinguish a system that transmits a secret from one that does not is measured by overall success on the set of all traces of each system. Non-trace-based properties present a challenge for inductive or compositional methods: induction is a natural way of reasoning about traces of a system, but it does not appear directly applicable to non-trace properties. We therefore investigate the semantic connection between trace properties that could be established by induction and non-trace-based security requirements. Specifically, we prove that a certain trace property implies computational secrecy and authentication properties, assuming the encryption scheme provides chosen ciphertext security and ciphertext integrity. We also prove a similar theorem for computational secrecy assuming Decisional Diffie-Hellman and a chosen plaintext secure encryption scheme.
机译:协议身份验证属性通常基于跟踪,这意味着如果身份验证适用于单个跟踪(协议和对手的运行),则身份验证适用于协议。另一方面,计算保密条件通常不是基于跟踪的:通过计算区分系统中传输秘密的系统与未传输秘密的系统的能力,是通过对每个系统的所有跟踪的总成功率来衡量的。非基于痕迹的特性对归纳或组合方法提出了挑战:归纳是推理系统痕迹的自然方法,但它似乎并不直接适用于非痕迹特性。因此,我们研究了可以通过归纳和基于非跟踪的安全性要求建立的跟踪属性之间的语义联系。具体而言,假设加密方案提供了选定的密文安全性和密文完整性,我们证明某个跟踪属性暗示了计算的保密性和身份验证属性。我们还假设了决策Diffie-Hellman和选择的明文安全加密方案,也证明了计算机密性的相似定理。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号