Contents/conteúdo

Mathematics Department Técnico Técnico

Information Security Seminar  RSS

Sessions

19/06/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
, School of Information Science and Technology, University of Tokyo

Computational Soundness of Observational Equivalence without Requiring Computable Parsing

There are two main approaches to the analysis of security protocols. The first is a computational approach: a message is a bit string, an attacker is modeled as a probabilistic polynomial-time interactive Turing machine, and security properties are defined as an indistinguishability game. The analysis of protocols in this approach is based on computational complexity theory and takes account of the probability that the attacker breaks the security of cryptographic primitives. The second is a symbolic approach: a message is abstracted into a symbolic expression, an attacker is a symbolic process, and security properties, such as anonymity, can be expressed by the observational equivalence of processes. The analysis in this approach assumes ideally secure cryptographic primitives and is simple to automate. Starting with the seminal work of Abadi and Rogaway, there have been several results showing the computational soundness of the symbolic approach: security proofs in the symbolic approach imply strong security guarantees based on computational complexity theory. We extend Comon-Lundh and Cortier's recent work to show the computational soundness of the applied pi-calculus for a public-key encryption scheme and a ring signature scheme in the presence of active adversaries: the observational equivalence between two processes in the applied pi-calculus implies the computational indistinguishability between the computational executions of the two processes. Our proof for computational soundness is different from all existing studies in that it does not use a computable parsing function from bitstrings to terms. With the primitives that are considered here, it would not be a big additional hypothesis to assume such a parsing function. However, conceptually, this yields different proofs, which may allow us to obtain other soundness results such as XOR or hashing, while such proofs could not be conducted in a simulatability framework called the BPW model.
This seminar will be held in the Alameda campus!