The Game-based Methodology for Computational Security Proofs
David Pointcheval
Ecole normale sup´ erieure, CNRS & INRIAComputational and Symbolic Proofs of Security Atagawa Heights – Japan April 6th, 2009
David Pointcheval – 1/39 Cryptography Game-based Proofs Assumptions BF IB-Encryption ConclusionOutline
1Cryptography Introduction Provable Security
2Game-based Methodology Game-based Approach Transition Hops
3Assumptions
4Identity-Based Encryption Definition Description of BF Security Proof
5Conclusion
David Pointcheval – 2/39 Cryptography Game-based Proofs Assumptions BF IB-Encryption ConclusionOutline
1Cryptography Introduction Provable Security
2Game-based Methodology Game-based Approach Transition Hops
3Assumptions
4Identity-Based Encryption Definition Description of BF Security Proof
5Conclusion
David Pointcheval – 3/39 Cryptography Game-based Proofs Assumptions BF IB-Encryption Conclusion IntroductionPublic-Key Cryptography
Asymmetric cryptography Encryption Signature Encryption guarantees privacy Signature guarantees authentication, and even non-repudiation by the sender
David Pointcheval – 4/39