首页> 外文会议>Advances in Cryptology - ASIACRYPT 2008 >Limits of Constructive Security Proofs
【24h】

Limits of Constructive Security Proofs

机译:建设性安全证明的局限性

获取原文
获取原文并翻译 | 示例

摘要

The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in fact constitutes a parametrized family of functions, since for a single function, the adversary could simply know a single hard-coded collision. In practical applications, however, unkeyed hash functions are a common choice, creating a gap between the practical application and the formal proof, and, even more importantly, the concise mathematical definitions.rnA pragmatic way out of this dilemma was recently formalized by Ro-gaway: instead of requiring that no adversary exists that breaks the protocol (existential security), one requires that given an adversary that breaks the protocol, we can efficiently construct a collision of the hash function using an explicitly given reduction (constructive security).rnIn this paper, we show the limits of this approach: We give a protocol that is existentially secure, but that provably cannot be proven secure using a constructive security proof.rnConsequently, constructive security--albeit constituting a useful improvement over the state of the art-is not comprehensive enough to encompass all protocols that can be dealt with using existential security proofs.
机译:哈希函数的抗冲突性是许多密码协议的重要基础。从形式上讲,只有在哈希函数实际上构成了参数化的函数族的情况下,才可以期望具有抗冲突性,因为对于单个函数,对手可以简单地知道单个硬编码的冲突。然而,在实际应用中,无键哈希函数是常见的选择,这在实际应用和形式证明之间形成了差距,更重要的是,简洁的数学定义也是如此。最近,Ro- gaway:不是要求不存在破坏协议的对手(现有安全性),而是要求给定一个破坏协议的对手,我们可以使用显式给定的约简(构造安全性)有效地构造哈希函数的冲突。在本文中,我们展示了这种方法的局限性:我们给出了一个协议,它是存在上安全的,但是使用建设性的安全证明无法证明是安全的。rn因此,建设性的安全-尽管构成了对现有技术的有益改进-不够全面,无法涵盖使用现有安全性证明可以处理的所有协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号