Abstract Cryptography Ueli Maurer ETH Zurich FOSAD 2009, - - PowerPoint PPT Presentation

abstract cryptography
SMART_READER_LITE
LIVE PREVIEW

Abstract Cryptography Ueli Maurer ETH Zurich FOSAD 2009, - - PowerPoint PPT Presentation

Abstract Cryptography Ueli Maurer ETH Zurich FOSAD 2009, Bertinoro, Aug./Sept. 2009. Abstract Cryptography I can only understand simple things. J AMES M ASSEY Ueli Maurer ETH Zurich FOSAD 2009, Bertinoro, Aug./Sept. 2009. Abstraction


slide-1
SLIDE 1

Abstract Cryptography

Ueli Maurer ETH Zurich

FOSAD 2009, Bertinoro, Aug./Sept. 2009.

slide-2
SLIDE 2

Abstract Cryptography

Ueli Maurer ETH Zurich

FOSAD 2009, Bertinoro, Aug./Sept. 2009.

“I can only understand simple things.” JAMES MASSEY

slide-3
SLIDE 3

Abstraction

Abstraction: eliminate irrelevant details from consideration Examples: group, field, vector space, relation, graph, .... Goals of abstraction:

  • simpler definitions
  • generality of results
  • simpler proofs
  • elegance
  • didactic suitability
slide-4
SLIDE 4

Abstraction

Abstraction: eliminate irrelevant details from consideration Examples: group, field, vector space, relation, graph, .... Goals of abstraction:

  • simpler definitions
  • generality of results
  • simpler proofs
  • elegance
  • didactic suitability
  • understanding
slide-5
SLIDE 5

Abstraction

Abstraction: eliminate irrelevant details from consideration Examples: group, field, vector space, relation, graph, .... Goals of abstraction:

  • simpler definitions
  • generality of results
  • simpler proofs
  • elegance
  • didactic suitability
  • understanding

Goals of this talk:

  • Introduce layers of abstraction in cryptography.
  • Examples of abstract definitions and proofs.
  • Announce a new security framework

“abstract cryptography” (with Renato Renner).

slide-6
SLIDE 6

Motivating example: One-time pad

1

C , C , ...

1

ciphertext

1 2

key

2 1

key

2 1

2 2

addition modulo 2

M , M , ... M , M , ... plaintext plaintext

K , K , ... K , K , ...

slide-7
SLIDE 7

Motivating example: One-time pad

1

C , C , ...

1

ciphertext

1 2

key

2 1

key

2 1

2 2

addition modulo 2

M , M , ... M , M , ... plaintext plaintext

K , K , ... K , K , ...

Perfect secrecy (Shannon): C and M statist. independent.

slide-8
SLIDE 8

One-time pad in terms of systems

.

A B E AUT

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-9
SLIDE 9

One-time pad in terms of systems

. .

A B E AUT

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-10
SLIDE 10

One-time pad in terms of systems

.

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-11
SLIDE 11

One-time pad in terms of systems

. .

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-12
SLIDE 12

One-time pad in terms of systems

.

  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-13
SLIDE 13

One-time pad in terms of systems

.

  • tp−dec
  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-14
SLIDE 14

One-time pad in terms of systems

.

  • tp−dec
  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-15
SLIDE 15

One-time pad in terms of systems

. .

SEC

  • tp−dec
  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-16
SLIDE 16

One-time pad in terms of systems

.

$ sim SEC

  • tp−dec
  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-17
SLIDE 17

One-time pad in terms of systems

.

$ sim SEC

  • tp−dec
  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-18
SLIDE 18

One-time pad in terms of systems

.

|.| $ sim SEC

  • tp−dec
  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

slide-19
SLIDE 19

One-time pad in terms of systems

. .

|.| $ sim SEC

  • tp−dec
  • tp−enc

A B E AUT A E B $ KEY

  • tp-decB otp-encA (KEY||AUT) ≡

simE SEC

written as a reduction:

(KEY||AUT)

  • tp

− →

SEC

slide-20
SLIDE 20

Symmetric encryption

.

|.| $ sim SEC dec

D

enc

E

A B E AUT A E B $ KEY

decB encA (KEY||AUT) ≈ simE SEC

written as a reduction:

(KEY||AUT) tsymt

− →

SEC

slide-21
SLIDE 21

Constructive cryptography

Reduction concept: real system R protocol π

− →

ideal system S Resource S is constructed from (reduced to) R by protocol π

slide-22
SLIDE 22

Constructive cryptography

Reduction concept: real system R protocol π

− →

ideal system S Resource S is constructed from (reduced to) R by protocol π Example: Alice-Bob-Eve setting π = (π1, π2)

slide-23
SLIDE 23

Constructive cryptography

Reduction concept: real system R protocol π

− →

ideal system S Resource S is constructed from (reduced to) R by protocol π Example: Alice-Bob-Eve setting π = (π1, π2)

R

π

− → S

:⇔ ∃σ : π1

A π2 B R ≈ σ E S

slide-24
SLIDE 24

Constructive cryptography

Reduction concept: real system R protocol π

− →

ideal system S Resource S is constructed from (reduced to) R by protocol π Example: Alice-Bob-Eve setting π = (π1, π2)

R

π

− → S

:⇔ ∃σ : π1

A π2 B R ≈ σ E S

and π1

A π2 B ⊥ E R ≈ ⊥ E S

slide-25
SLIDE 25

Constructive cryptography

Reduction concept: real system R protocol π

− →

ideal system S Resource S is constructed from (reduced to) R by protocol π Example: Alice-Bob-Eve setting π = (π1, π2)

R

π

− → S

:⇔ ∃σ : π1

A π2 B R ≈ σ E S

and π1

A π2 B ⊥ E R ≈ ⊥ E S

Composability of a reduction: R

α

− → S ∧ S

β

− → T

⇒ R

α◦β

− → T

slide-26
SLIDE 26

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-27
SLIDE 27

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-28
SLIDE 28

Example: CBC-MAC [3 (4)]

AES

former block selector

  • utput
slide-29
SLIDE 29

Example: CBC-MAC [3 (4)]

computationally indistinguishable

random

  • racle

AES

former block selector

  • utput
slide-30
SLIDE 30

Example: CBC-MAC [3 (4)]

AES

former block selector

  • utput
slide-31
SLIDE 31

Example: CBC-MAC [3 (4)]

AES CBC AES

former block selector

  • utput
slide-32
SLIDE 32

Example: CBC-MAC [3 (4)]

AES CBC AES

former block selector

  • utput

Notation: D C B C(A E S)

slide-33
SLIDE 33

Example: CBC-MAC [3 (4)]

AES CBC AES

former block selector

  • utput

Notation: D C B C◦A E S

slide-34
SLIDE 34

Example: CBC-MAC [3 (4)]

AES CBC AES

former block selector

  • utput

Notation: D C B C A E S

slide-35
SLIDE 35

Example: CBC-MAC [3 (4)]

0/1

D

AES CBC AES

former block selector

  • utput

Notation: D C B C A E S

slide-36
SLIDE 36

Example: CBC-MAC [3 (4)]

0/1

D D

0/1

AES CBC AES

former block selector

  • utput

Notation: D C B C A E S

slide-37
SLIDE 37

Security proof for CBC-MAC [3]

AES CBC RO

D C B C A E S ≈ D R O

slide-38
SLIDE 38

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O

slide-39
SLIDE 39

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆D(C

B CA E S, R O) ≈ 0

slide-40
SLIDE 40

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆D(C

B CA E S, R O) ≈ 0 Note: ∆D(S, T) = |DS, DT| (stat. distance of binary r.v.)

slide-41
SLIDE 41

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆D(C

B CA E S, R O) ≈ 0

slide-42
SLIDE 42

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

slide-43
SLIDE 43

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(S, T) := maxD∈E∆D(S, T)

slide-44
SLIDE 44

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

slide-45
SLIDE 45

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0 Lemma: ∆D and ∆E are pseudo-metrics:

  • ∆E(S, S) = 0
  • ∆E(R, T) ≤ ∆E(R, S) + ∆E(S, T)
slide-46
SLIDE 46

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O) Lemma: ∆D and ∆E are pseudo-metrics:

  • ∆E(S, S) = 0
  • ∆E(R, T) ≤ ∆E(R, S) + ∆E(S, T)
slide-47
SLIDE 47

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O) .

slide-48
SLIDE 48

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O) Absorption lemma: ∆D(CS, CT) = ∆DC(S, T) Proof: DCS = D(CS) = (DC)S

slide-49
SLIDE 49

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O)

∆E(C

B CA E S, C B CR F) = ∆EC B C(A E S, R F) Absorption lemma: ∆D(CS, CT) = ∆DC(S, T) Proof: DCS = D(CS) = (DC)S

slide-50
SLIDE 50

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O)

∆E(C

B CA E S, C B CR F) = ∆EC B C(A E S, R F) Non-expansion lemma:

DC ⊆ D

⇒ ∆D(CS, CT) ≤ ∆D(S, T)

slide-51
SLIDE 51

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O)

∆E(C

B CA E S, C B CR F) = ∆EC B C(A E S, R F) Non-expansion lemma:

DC ⊆ D

⇒ ∆D(CS, CT) ≤ ∆D(S, T)

EC

B C ⊆ E

slide-52
SLIDE 52

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O)

∆E(C

B CA E S, C B CR F) = ∆EC B C(A E S, R F) ≤ ∆E(A E S, R F) Non-expansion lemma:

DC ⊆ D

⇒ ∆D(CS, CT) ≤ ∆D(S, T)

EC

B C ⊆ E

slide-53
SLIDE 53

Security proof for CBC-MAC [3]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O)

∆E(C

B CA E S, C B CR F) = ∆EC B C(A E S, R F) ≤ ∆E(A E S, R F) .

slide-54
SLIDE 54

Security proof for CBC-MAC [3,4]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O)

∆E(C

B CA E S, C B CR F) = ∆EC B C(A E S, R F) ≤ ∆E(A E S, R F)

∆(C

B CR F, R O) ≤ 1

2ℓ22−n

[BKR94,...]

[4]

slide-55
SLIDE 55

Security proof for CBC-MAC [3,4]

D

0/1

D

0/1

AES CBC RO

D C B C A E S ≈ D R O To show:

∆E(C

B CA E S, R O) ≈ 0

∆E(C

B CA E S, R O) ≤ ∆E(C B CA E S, C B CR F)+∆E(C B CR F, R O)

∆E(C

B CA E S, C B CR F) = ∆EC B C(A E S, R F) ≤ ∆E(A E S, R F)

∆(C

B CR F, R O) ≤ 1

2ℓ22−n

[BKR94,...]

[4]

Note: Many security proofs can be phrased at this level of abstraction and become quite simple or even trivial.

slide-56
SLIDE 56

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-57
SLIDE 57

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-58
SLIDE 58

Efficient, infeasible, negligible [5]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible
slide-59
SLIDE 59

Efficient, infeasible, negligible [5]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems.

slide-60
SLIDE 60

Efficient, infeasible, negligible [5,3]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems. E ◦ E ⊆ E, E||E ⊆ E

slide-61
SLIDE 61

Efficient, infeasible, negligible [5,3]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems. F = set of feasibly impl. systems (E ⊆ F) E ◦ E ⊆ E, E||E ⊆ E

slide-62
SLIDE 62

Efficient, infeasible, negligible [5,3]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems. F = set of feasibly impl. systems (E ⊆ F) E ◦ E ⊆ E, E||E ⊆ E F ◦ F ⊆ F, F||F ⊆ F

slide-63
SLIDE 63

Efficient, infeasible, negligible [5,3]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems. F = set of feasibly impl. systems (E ⊆ F) E ◦ E ⊆ E, E||E ⊆ E F ◦ F ⊆ F, F||F ⊆ F No reason to set E = F !

slide-64
SLIDE 64

Efficient, infeasible, negligible [5,3]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems. F = set of feasibly impl. systems (E ⊆ F) N = set of negligible functions E ◦ E ⊆ E, E||E ⊆ E F ◦ F ⊆ F, F||F ⊆ F

slide-65
SLIDE 65

Efficient, infeasible, negligible [5,3]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems. F = set of feasibly impl. systems (E ⊆ F) N = set of negligible functions E ◦ E ⊆ E, E||E ⊆ E F ◦ F ⊆ F, F||F ⊆ F F · N ⊆ N

slide-66
SLIDE 66

Efficient, infeasible, negligible [5,3]

We need notions for

  • the complexity of system implementation
  • what is efficient (for the good guys)
  • what is infeasible (for the bad guys)
  • what is negligible

E = set of efficiently impl. systems. F = set of feasibly impl. systems (E ⊆ F) N = set of negligible functions E ◦ E ⊆ E, E||E ⊆ E F ◦ F ⊆ F, F||F ⊆ F F · N ⊆ N Note: The usual poly-time notions (i.e., nO(1)) are of course composable, but so are many other notions, e.g. nO(log log n) or nO(√log log log n).

slide-67
SLIDE 67

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-68
SLIDE 68

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-69
SLIDE 69

Discrete systems [4]

X , X , ...

1 2

S

2 1

Y , Y , ...

slide-70
SLIDE 70

Discrete systems [4]

X , X , ...

1 2

S

2 1

Y , Y , ...

Description of S: figure, pseudo-code, text, ...

slide-71
SLIDE 71

Discrete systems [4]

X , X , ...

1 2

S

2 1

Y , Y , ...

Description of S: figure, pseudo-code, text, ... What kind of mathematical object is the behavior of S?

slide-72
SLIDE 72

Discrete systems [4]

X , X , ...

1 2

S

2 1

Y , Y , ...

Description of S: figure, pseudo-code, text, ... What kind of mathematical object is the behavior of S? (where Xi = (X1, . . . , Xi)) This abstraction is called a random system [Mau02]. Characterized by: pS

Y i|Xi

for i = 1, 2, . . .

slide-73
SLIDE 73

Discrete systems [4]

X , X , ...

1 2

S

2 1

Y , Y , ...

Description of S: figure, pseudo-code, text, ... What kind of mathematical object is the behavior of S? (where Xi = (X1, . . . , Xi)) This abstraction is called a random system [Mau02]. Characterized by: pS

Y i|Xi

for i = 1, 2, . . . Equivalence of systems: S ≡ T if same behavior

slide-74
SLIDE 74

Games [4]

PRP-PRF switching lemma:

2 1

X , X , ...

1 2

S

Y , Y , ...

slide-75
SLIDE 75

Games [4]

PRP-PRF switching lemma:

monotone binary output (MBO)

1

i

A , A , ...

2 1 2 1

X , X , ...

1 2

S

Y , Y , ...

slide-76
SLIDE 76

Games [4]

PRP-PRF switching lemma:

game won monotone binary output (MBO)

1

i

A , A , ...

2 1 2 1

X , X , ...

1 2

S

Y , Y , ...

slide-77
SLIDE 77

Games [4]

PRP-PRF switching lemma:

game won monotone binary output (MBO)

1

i

A , A , ...

2 1 2 1

X , X , ...

1 2

S

Y , Y , ...

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . .

slide-78
SLIDE 78

Games [4]

PRP-PRF switching lemma:

D

game won monotone binary output (MBO)

1

i

A , A , ...

2 1 2 1

X , X , ...

1 2

S

Y , Y , ...

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . .

slide-79
SLIDE 79

Games [4]

PRP-PRF switching lemma:

D

game won monotone binary output (MBO)

1

i

A , A , ...

2 1 2 1

X , X , ...

1 2

S

Y , Y , ...

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . . Conditional equivalence: S|A ≡ T :⇔ pS

Y i|XiAi = pT Y i|Xi

slide-80
SLIDE 80

Games [4]

PRP-PRF switching lemma:

D

game won monotone binary output (MBO)

1

i

A , A , ...

2 1 2 1

X , X , ...

1 2

S

Y , Y , ...

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . . Conditional equivalence: S|A ≡ T :⇔ pS

Y i|XiAi = pT Y i|Xi

Lemma [M02]: S|A ≡ T ⇒ ∆(S, T) ≤ optimal prob. of provoking the MBO non-adaptively in S (same # of queries).

slide-81
SLIDE 81

Games [4]

PRP-PRF switching lemma:

X , X , ...

1 2 2 1

Y , Y , ...

2 1

Y , Y , ...

P

X , X , ...

1 2

R

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . . Conditional equivalence: S|A ≡ T :⇔ pS

Y i|XiAi = pT Y i|Xi

Lemma [M02]: S|A ≡ T ⇒ ∆(S, T) ≤ optimal prob. of provoking the MBO non-adaptively in S (same # of queries).

slide-82
SLIDE 82

Games [4]

PRP-PRF switching lemma:

A , A , ...

2 1

collision detector

X , X , ...

1 2 2 1

Y , Y , ...

2 1

Y , Y , ...

P

X , X , ...

1 2

R

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . . Conditional equivalence: S|A ≡ T :⇔ pS

Y i|XiAi = pT Y i|Xi

Lemma [M02]: S|A ≡ T ⇒ ∆(S, T) ≤ optimal prob. of provoking the MBO non-adaptively in S (same # of queries).

slide-83
SLIDE 83

Games [4]

PRP-PRF switching lemma:

A , A , ...

2 1

collision detector

X , X , ...

1 2 2 1

Y , Y , ...

2 1

Y , Y , ...

P

X , X , ...

1 2

R

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . . Conditional equivalence: S|A ≡ T :⇔ pS

Y i|XiAi = pT Y i|Xi

Lemma [M02]: S|A ≡ T ⇒ ∆(S, T) ≤ optimal prob. of provoking the MBO non-adaptively in S (same # of queries). R|A ≡ P ⇒ ∆k(R, P) ≤

k

k

  • 2−n
slide-84
SLIDE 84

Games [4]

PRP-PRF switching lemma:

A , A , ...

2 1

collision detector

X , X , ...

1 2 2 1

Y , Y , ...

2 1

Y , Y , ...

P

X , X , ...

1 2

R

Characterized by: pS

Y iAi|Xi

for i = 1, 2, . . . Conditional equivalence: S|A ≡ T :⇔ pS

Y i|XiAi = pT Y i|Xi

Lemma [M02]: S|A ≡ T ⇒ ∆(S, T) ≤ optimal prob. of provoking the MBO non-adaptively in S (same # of queries). R|A ≡ P ⇒ ∆k(R, P) ≤

k

k

  • 2−n

Similarly simple proof of CBC-MAC security: (C B CR F)|A ≡ R O ⇒ ∆(C B CR F, R O) ≤ 1

2ℓ22−n

slide-85
SLIDE 85

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-86
SLIDE 86

Levels of abstraction in cryptography # possible name

concepts treated at this level

1.

Reductions

  • def. of (universal) composability

2.

Abstract resources isomorphism

3.

Abstract systems distinguisher, hybrid argument, secure reduction, compos. proof

4.

Discrete systems games, equivalence, indistinguishability proofs

5.

System implem. complexity, efficiency notion

6.

Physical models timing, power, side-channels

slide-87
SLIDE 87

Abstract Cryptography (with Renato Renner) [1-3]

slide-88
SLIDE 88

Abstract Cryptography (with Renato Renner) [1-3]

Goals:

  • capture the constructive security paradigm at high(est)

abstraction level

slide-89
SLIDE 89

Abstract Cryptography (with Renato Renner) [1-3]

Goals:

  • capture the constructive security paradigm at high(est)

abstraction level

  • define strongest possible reduction between resources
slide-90
SLIDE 90

Abstract Cryptography (with Renato Renner) [1-3]

Goals:

  • capture the constructive security paradigm at high(est)

abstraction level

  • define strongest possible reduction between resources
  • see other frameworks as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

slide-91
SLIDE 91

Abstract Cryptography (with Renato Renner) [1-3]

Goals:

  • capture the constructive security paradigm at high(est)

abstraction level

  • define strongest possible reduction between resources
  • see other frameworks as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

  • capture scenarios that could previously not be modeled.
slide-92
SLIDE 92

Resources and isomorphisms [2]

{1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

slide-93
SLIDE 93

Resources and isomorphisms [2]

{1,2} {1,2,3} 1 2 1 2 3 5 7 3 3 8 7

payout

{1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

slide-94
SLIDE 94

Resources and isomorphisms [2]

? = ~

{1,2} {1,2,3} 1 2 1 2 3 5 7 3 3 8 7

payout

{1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

slide-95
SLIDE 95

Resources and isomorphisms [2]

{1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

slide-96
SLIDE 96

Resources and isomorphisms [2]

{a,b,c} {1,2}

payout

a b 1 2 3 5 7 3 5 c 8 {1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

slide-97
SLIDE 97

Resources and isomorphisms [2]

{a,b,c} {1,2}

payout

a b 1 2 3 5 7 3 5 c 8 {1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

slide-98
SLIDE 98

Resources and isomorphisms [2]

= ~

{a,b,c} {1,2}

payout

a b 1 2 3 5 7 3 5 c 8 {1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

slide-99
SLIDE 99

Resources and isomorphisms [2]

= ~

{a,b,c} {1,2}

payout

a b 1 2 3 5 7 3 5 c 8 {1,2} {1,2,3} 1 2 1 2 3 8 8 5 3 7 5 Alice Bob

payout

Complete local relations

slide-100
SLIDE 100

Abstract multi-party setting [3]

R

2 3 4 1

slide-101
SLIDE 101

Abstract multi-party setting [3]

R

2 3 4 1

R

slide-102
SLIDE 102

Abstract multi-party setting [3]

R

2 3 4 1

α

α1R

slide-103
SLIDE 103

Abstract multi-party setting [3]

R

2 3 4 1

β

β2R

slide-104
SLIDE 104

Abstract multi-party setting [3]

R

2 3 4 1

γ

γ3R

slide-105
SLIDE 105

Abstract multi-party setting [3]

R

2 3 4 1

α

α1R

slide-106
SLIDE 106

Abstract multi-party setting [3]

R

2 3 4 1

β α

β2α1R

slide-107
SLIDE 107

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

γ3β2α1R

slide-108
SLIDE 108

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

γ3β2α1R

R

slide-109
SLIDE 109

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

β

γ3β2α1R β2R

slide-110
SLIDE 110

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

γ β

γ3β2α1R γ3β2R

slide-111
SLIDE 111

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

γ β α

γ3β2α1R α1γ3β2R

slide-112
SLIDE 112

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

γ β α

γ3β2α1R

=

α1γ3β2R

slide-113
SLIDE 113

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

γ β α

γ3β2α1R

=

α1γ3β2R

Resource set Φ for interface set I = {1, 2, 3, 4}, oper. ||

slide-114
SLIDE 114

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

γ β α

γ3β2α1R

=

α1γ3β2R

Resource set Φ for interface set I = {1, 2, 3, 4}, oper. || Converter set Σ, with operation ◦

slide-115
SLIDE 115

Abstract multi-party setting [3]

R

2 3 4 1

γ β α

R

2 3 4 1

γ β α

γ3β2α1R

=

α1γ3β2R

Resource set Φ for interface set I = {1, 2, 3, 4}, oper. || Converter set Σ, with operation ◦ Algebraic laws:

  • αiR ∈ Φ

for all R ∈ Φ, α ∈ Σ, i ∈ I

  • αiβjR ≡ βjαiR

for all i = j

slide-116
SLIDE 116

Resource isomorphisms [3]

S R

1 2 3 4 2 3 4 1

slide-117
SLIDE 117

Resource isomorphisms [3]

S R

1 2 3 4

α4 α3 α2 α1

2 3 4 1

slide-118
SLIDE 118

Resource isomorphisms [3]

S R

β4 β3 β2 β1

1 2 3 4

α4 α3 α2 α1

2 3 4 1

slide-119
SLIDE 119

Resource isomorphisms [3]

S R

β4 β3 β2 β1

1 2 3 4

α4 α3 α2 α1

2 3 4 1

slide-120
SLIDE 120

Resource isomorphisms [3]

S R

β1

1 2 3 4

α1

2 3 4 1

slide-121
SLIDE 121

Resource isomorphisms [3]

S R

β1

1 2 3 4

α1

2 3 4 1

slide-122
SLIDE 122

Resource isomorphisms [3]

S R

β1

1 2 3 4 2 3 4 1

slide-123
SLIDE 123

Resource isomorphisms [3]

S R

β1 β1 π1 β1

1 2 3 4 2 3 4 1

slide-124
SLIDE 124

Resource isomorphisms [3]

S R

β4

1 2 3 4 2 3 4 1

slide-125
SLIDE 125

Resource isomorphisms [3]

S R

β4 π4 β4

1 2 3 4 2 3 4 1

slide-126
SLIDE 126

Resource isomorphisms [3]

S R

π4 π3 π2 π1

1 2 3 4 2 3 4 1

slide-127
SLIDE 127

Resource isomorphisms [3]

S R

1 2 3 4

α4

2 3 4 1

slide-128
SLIDE 128

Resource isomorphisms [3]

S R

α4 σ4

1 2 3 4

α4

2 3 4 1

slide-129
SLIDE 129

Resource isomorphisms [3]

S R

σ4 σ3 σ2 σ1

1 2 3 4 2 3 4 1

slide-130
SLIDE 130

Resource isomorphisms [3]

S R

σ4 σ3 σ2 σ1

1 2 3 4 2 3 4 1

Definition: R is isomorphic to S via π, denoted R ∼ =π S, if

slide-131
SLIDE 131

Resource isomorphisms [3]

S R

σ4 σ3 π2 π1

1 2 3 4 2 3 4 1

Definition: R is isomorphic to S via π, denoted R ∼ =π S, if

slide-132
SLIDE 132

Resource isomorphisms [3]

S R

σ3 σ2 σ1 π4

1 2 3 4 2 3 4 1

Definition: R is isomorphic to S via π, denoted R ∼ =π S, if

slide-133
SLIDE 133

Resource isomorphisms [3]

S R

σ4 σ2 π3 π1

1 2 3 4 2 3 4 1

Definition: R is isomorphic to S via π, denoted R ∼ =π S, if

slide-134
SLIDE 134

Resource isomorphisms [3]

S R

σ4 σ2 π3 π1

1 2 3 4 2 3 4 1

Definition: R is isomorphic to S via π, denoted R ∼ =π S, if

R ∼

=π S :⇐ ⇒ ∃σ ∀P ⊆ I : πP R ≡ σP S

slide-135
SLIDE 135

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2

slide-136
SLIDE 136

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2

          

⇔ abstract UC

slide-137
SLIDE 137

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1)

slide-138
SLIDE 138

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1)

slide-139
SLIDE 139

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1)

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-140
SLIDE 140

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel.

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-141
SLIDE 141

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel. Corollary [CF01]: Commitment cannot be realized (from a communication channel).

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-142
SLIDE 142

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel. Corollary [CF01]: Commitment cannot be realized (from a communication channel).

C

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-143
SLIDE 143

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel. Corollary [CF01]: Commitment cannot be realized (from a communication channel).

C

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-144
SLIDE 144

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel. Corollary [CF01]: Commitment cannot be realized (from a communication channel).

C C

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-145
SLIDE 145

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel. Corollary [CF01]: Commitment cannot be realized (from a communication channel).

?

C C

α

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-146
SLIDE 146

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel. Corollary [CF01]: Commitment cannot be realized (from a communication channel). Corollary: A delayed communication channel cannot be realized (from a communication channel).

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

slide-147
SLIDE 147

Example: 2-party resources [2]

R ∼ =π S :⇐ ⇒

                

π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 π1Rπ2 ≈ σ1Sσ2 Special case: R = channel (neutral element, e.g. π1R = π1) Theorem: A resource S such that SαS ≈ S for all α cannot be realized from a communication channel. Corollary [CF01]: Commitment cannot be realized (from a communication channel). Corollary: A delayed communication channel cannot be realized (from a communication channel).

   ⇒ π1π2 ≈ Sσ2σ1S ≈ S

Note: Isomorphism is the precisest possible relation between resources, but as such is completely rigid.

slide-148
SLIDE 148

Abstraction by Sets of Resources

Abstraction of a concept corresponds to a set!

slide-149
SLIDE 149

Abstraction by Sets of Resources

Abstraction of a concept corresponds to a set! Consider sets R and S of resources.

slide-150
SLIDE 150

Abstraction by Sets of Resources

Abstraction of a concept corresponds to a set! Consider sets R and S of resources. Of special interest: Resources specified by (for each party)

  • a guaranteed action space
  • a possible action space
slide-151
SLIDE 151

Abstraction by Sets of Resources

Abstraction of a concept corresponds to a set! Consider sets R and S of resources. Of special interest: Resources specified by (for each party)

  • a guaranteed action space
  • a possible action space

Definition: S is an abstraction of R via π:

R ⊑π S :⇐ ⇒ ∀R∈R ∃S∈S : R ∼ =π S

slide-152
SLIDE 152

Abstraction by Sets of Resources

Abstraction of a concept corresponds to a set! Consider sets R and S of resources. Of special interest: Resources specified by (for each party)

  • a guaranteed action space
  • a possible action space

Definition: S is an abstraction of R via π:

R ⊑π S :⇐ ⇒ ∀R∈R ∃S∈S : R ∼ =π S

Theorem: R ⊑π S is a universally composable reduction.

slide-153
SLIDE 153

Reductions [1]

The reduction R α

− → S

is called sequentially composable if 1. R

α

− → S ∧ S

β

− → T

⇒ R

α◦β

− → T

slide-154
SLIDE 154

Reductions [1]

The reduction R α

− → S

is called sequentially composable if 1. R

α

− → S ∧ S

β

− → T

⇒ R

α◦β

− → T

It is called universally composable if in addition: 2. R

id

− → R

3. R

α

− → S

⇒ R| |T

α|id

− → S|

|T

slide-155
SLIDE 155

Example: Encryption

|.| SEC dec

D

enc

E

A B E AUT A E B $ KEY

slide-156
SLIDE 156

Example: Encryption

sim_A |.| SEC dec

D

A B E AUT A E B $ KEY

slide-157
SLIDE 157

Example: Encryption

sim_A |.| SEC dec

D

A B E AUT A E B $ KEY

slide-158
SLIDE 158

Example: Encryption

$ KEY sim_A |.| SEC dec

D

A B E AUT A E B $ KEY

slide-159
SLIDE 159

Example: Encryption

$ KEY sim_A |.| SEC dec

D

A B E AUT A E B $ KEY

slide-160
SLIDE 160

Example: Encryption

$ KEY sim_A |.| SEC dec

D

A B E AUT A E B $ KEY

Theorem: An unleakable (uncoercible) secure communication channel cannot be realized from an authenticated channel and a secret key.

slide-161
SLIDE 161

Features of Abstract Cryptography

slide-162
SLIDE 162

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
slide-163
SLIDE 163

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
  • existing frameworks can be captured as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

slide-164
SLIDE 164

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
  • existing frameworks can be captured as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

  • communication model, complexity/efficiency notions, ....

treated at lower abstraction levels (not hard-wired)

slide-165
SLIDE 165

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
  • existing frameworks can be captured as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

  • communication model, complexity/efficiency notions, ....

treated at lower abstraction levels (not hard-wired)

  • reductions among resources, all resources captured
slide-166
SLIDE 166

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
  • existing frameworks can be captured as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

  • communication model, complexity/efficiency notions, ....

treated at lower abstraction levels (not hard-wired)

  • reductions among resources, all resources captured
  • sets of resources: guaranteed/possible action spaces
slide-167
SLIDE 167

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
  • existing frameworks can be captured as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

  • communication model, complexity/efficiency notions, ....

treated at lower abstraction levels (not hard-wired)

  • reductions among resources, all resources captured
  • sets of resources: guaranteed/possible action spaces
  • no central adversary → local simulators (see [AsV08])
slide-168
SLIDE 168

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
  • existing frameworks can be captured as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

  • communication model, complexity/efficiency notions, ....

treated at lower abstraction levels (not hard-wired)

  • reductions among resources, all resources captured
  • sets of resources: guaranteed/possible action spaces
  • no central adversary → local simulators (see [AsV08])
  • general notion of interfaces: consistency domains
slide-169
SLIDE 169

Features of Abstract Cryptography

  • strongest notion of reduction (isomorphism)
  • existing frameworks can be captured as special cases

– universal composability (UC) by Canetti – reactive simulatability by Pfitzmann/Waidner/Backes – indifferentiability [MRH04]

  • communication model, complexity/efficiency notions, ....

treated at lower abstraction levels (not hard-wired)

  • reductions among resources, all resources captured
  • sets of resources: guaranteed/possible action spaces
  • no central adversary → local simulators (see [AsV08])
  • general notion of interfaces: consistency domains

Let’s try to identify the right level of ab- straction of what we do in cryptography.