首页> 外文期刊>Theoretical computer science >On using probabilistic Turing machines to model participants in cryptographic protocols
【24h】

On using probabilistic Turing machines to model participants in cryptographic protocols

机译:关于使用概率图灵机对加密协议中的参与者进行建模

获取原文
获取原文并翻译 | 示例
       

摘要

To formalize participants in cryptographic protocols, it is common to use probabilistic Turing machines. We point out subtleties in common definitions of probabilistic Turing machines, which imply that the common cryptographic operation of uniform random sampling in a finite set {1,...,s} is contained in Z is in general not possible within this model. From a technical point of view, this invalidates in particular a standard proof of the perfect zero knowledge property of the popular graph isomorphism proof system. The observed limitation appears to be relevant for other cryptographic protocol analyses as well, and we suggest one possible tweak of the definition of a probabilistic Turing machine.
机译:为了使加密协议中的参与者正式化,通常使用概率图灵机。我们指出概率图灵机的通用定义中的细微之处,这意味着在此模型中通常不可能在Z中包含有限集{1,...,s}中的统一随机采样的通用密码运算。从技术角度来看,这尤其使流行的图同构证明系统的完全零知识特性的标准证明无效。观察到的限制似乎也与其他密码协议分析有关,我们建议对概率图灵机的定义进行一次可能的调整。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号