메뉴 건너뛰기




Volumn 6402 LNCS, Issue , 2010, Pages 35-52

A calculus for game-based security proofs

Author keywords

computational indistinguishability; game based proofs; implicit complexity

Indexed keywords

COMPUTATIONAL ASSUMPTIONS; GAME-BASED PROOFS; IMPLICIT COMPLEXITY; INDISTINGUISHABILITY; LAMBDA-CALCULUS; PROBABILISTIC POLYNOMIAL TIME; PSEUDO RANDOM; PUBLIC-KEY ENCRYPTION; SECURITY NOTION; SECURITY PROOFS; STILL MISSING; TYPE SYSTEMS; UNIFIED FRAMEWORK; UNIFORM DISTRIBUTION;

EID: 78449233442     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-16280-0_3     Document Type: Conference Paper
Times cited : (14)

References (29)
  • 2
    • 58049108667 scopus 로고    scopus 로고
    • A formal language for cryptographic pseudocode
    • Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. Springer, Heidelberg
    • Backes, M., Berg, M., Unruh, D.: A formal language for cryptographic pseudocode. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS (LNAI), vol. 5330, pp. 353-376. Springer, Heidelberg (2008)
    • (2008) LNCS (LNAI) , vol.5330 , pp. 353-376
    • Backes, M.1    Berg, M.2    Unruh, D.3
  • 4
    • 0002602593 scopus 로고
    • A new recursion-theoretic characterization of the polytime functions
    • Bellantoni, S., Cook, S.A.: A new recursion-theoretic characterization of the polytime functions. In: Computational Complexity, vol. 2, pp. 97-110 (1992)
    • (1992) Computational Complexity , vol.2 , pp. 97-110
    • Bellantoni, S.1    Cook, S.A.2
  • 5
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
    • Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Journal of Cryptology 21, 469-491 (2008)
    • (2008) Journal of Cryptology , vol.21 , pp. 469-491
    • Bellare, M.1    Namprempre, C.2
  • 6
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 8
    • 84947778144 scopus 로고    scopus 로고
    • The Decision Diffie-Hellman problem
    • Buhler, J.P. (ed.) ANTS 1998. Springer, Heidelberg
    • Boneh, D.: The Decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-83. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1423 , pp. 48-83
    • Boneh, D.1
  • 9
    • 38149024828 scopus 로고    scopus 로고
    • Code-based game-playing proofs and the security of triple encryption
    • Report 2004/331
    • Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint Archive, Report 2004/331 (2004)
    • (2004) Cryptology EPrint Archive
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 33746332058 scopus 로고    scopus 로고
    • A probabilistic Hoare-style logic for game-based cryptographic proofs
    • Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
    • Corin, R., den Hartog, J.: A probabilistic Hoare-style logic for game-based cryptographic proofs. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 252-263. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4052 , pp. 252-263
    • Corin, R.1    Den Hartog, J.2
  • 13
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469-472 (1985)
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 15
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • An earlier version appeared in proceedings of STOC
    • Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences (JCSS) 28(2), 270-299 (1984) (An earlier version appeared in proceedings of STOC 1982)
    • (1982) Journal of Computer and System Sciences (JCSS) , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 16
    • 84957704802 scopus 로고    scopus 로고
    • A Mixed Modal/Linear Lambda Calculus with Applications to Bellantoni-Cook Safe Recursion
    • Nielsen, M. (ed.) CSL 1997. Springer, Heidelberg
    • Hofmann, M.: A Mixed Modal/Linear Lambda Calculus with Applications to Bellantoni-Cook Safe Recursion. In: Nielsen, M. (ed.) CSL 1997. LNCS, vol. 1414, pp. 275-294. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1414 , pp. 275-294
    • Hofmann, M.1
  • 17
    • 0000201517 scopus 로고    scopus 로고
    • Safe recursion with higher types and BCK-algebra
    • 104
    • Hofmann, M.: Safe recursion with higher types and BCK-algebra. In: Annals of Pure and Applied Logic, vol. 1414, 104(1-3), pp. 113-166 (2000)
    • (2000) Annals of Pure and Applied Logic , vol.1414 , Issue.1-3 , pp. 113-166
    • Hofmann, M.1
  • 18
    • 84945267622 scopus 로고    scopus 로고
    • A formal approach to probabilistic termination
    • Carreño, V.A., Muñoz, C.A., Tahar, S. (eds.) TPHOLs 2002. Springer, Heidelberg
    • Hurd, J.: A formal approach to probabilistic termination. In: Carreño, V.A., Muñoz, C.A., Tahar, S. (eds.) TPHOLs 2002. LNCS, vol. 2410, pp. 230-245. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2410 , pp. 230-245
    • Hurd, J.1
  • 22
    • 33244491452 scopus 로고    scopus 로고
    • A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
    • Mitchell, J.C., Ramanathan, A., Scedrov, A., Teague, V.: A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols. Theoretical Computer Science 353(1-3), 118-164 (2006)
    • (2006) Theoretical Computer Science , vol.353 , Issue.1-3 , pp. 118-164
    • Mitchell, J.C.1    Ramanathan, A.2    Scedrov, A.3    Teague, V.4
  • 23
    • 0026188821 scopus 로고
    • Notions of computation and monads
    • Moggi, E.: Notions of computation and monads. Information and Computation 93(1), 55-92 (1991)
    • (1991) Information and Computation , vol.93 , Issue.1 , pp. 55-92
    • Moggi, E.1
  • 24
    • 38148999450 scopus 로고    scopus 로고
    • A framework for game-based security proofs
    • Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
    • Nowak, D.: A framework for game-based security proofs. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 319-333. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4861 , pp. 319-333
    • Nowak, D.1
  • 25
    • 67049117699 scopus 로고    scopus 로고
    • On formal verification of arithmetic-based cryptographic primitives
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
    • Nowak, D.: On formal verification of arithmetic-based cryptographic primitives. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 368-382. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 368-382
    • Nowak, D.1
  • 27
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Report 2004/332
    • Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004)
    • (2004) Cryptology EPrint Archive
    • Shoup, V.1
  • 29
    • 70350277480 scopus 로고    scopus 로고
    • The Computational SLR: A Logic for Reasoning about Computational Indistinguishability
    • Curien, P.-L. (ed.) TLCA 2009. Springer, Heidelberg
    • Zhang, Y.: The Computational SLR: A Logic for Reasoning about Computational Indistinguishability. In: Curien, P.-L. (ed.) TLCA 2009. LNCS, vol. 5608, pp. 401-415. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5608 , pp. 401-415
    • Zhang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.