【24h】

Limits of Constructive Security Proofs

机译:建设性安全证明的限制

获取原文

摘要

The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in fact constitutes a parametrized family of functions, since for a single function, the adversary could simply know a single hard-coded collision. In practical applications, however, unkeyed hash functions are a common choice, creating a gap between the practical application and the formal proof, and, even more importantly, the concise mathematical definitions. A pragmatic way out of this dilemma was recently formalized by Ro-gaway: instead of requiring that no adversary exists that breaks the protocol (existential security), one requires that given an adversary that breaks the protocol, we can efficiently construct a collision of the hash function using an explicitly given reduction (constructive security). In this paper, we show the limits of this approach: We give a protocol that is existentially secure, but that provably cannot be proven secure using a constructive security proof. Consequently, constructive security - albeit constituting a useful improvement over the state of the art - is not comprehensive enough to encompass all protocols that can be dealt with using existential security proofs.
机译:哈希函数的碰撞抵抗是许多加密协议的重要基础。正式,只能预期碰撞电阻如果哈希函数实际上构成了参数化的函数,因为对于单个函数,敌对方式可以简单地知道单个硬编码的碰撞。然而,在实际应用中,不合格的哈希函数是一个常见的选择,在实际应用和正式证明之间产生差距,并且更重要的是,简明的数学定义。最近通过Ro-Gaway正式化了这种杀戮的务实方式:而不是要求违反议定书(存在安全)的对手,而要求给予违反议定书的对手,我们可以有效地构建碰撞使用明确的减少(建设性安全性)的哈希函数。在本文中,我们展示了这种方法的极限:我们提供了一种存在的协议,这是存在的安全性,但不能使用建设性的安全证明证明可以确保安全。因此,构成安全性 - 尽管构成了对现有技术的有用改进 - 这并不足够全面地包含可以使用存在性安全性证明处理的所有协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号