Reconciling two views of cryptography (The computational soundness of formal encryption)

被引:178
作者
Abadi, M [1 ]
Rogaway, P
机构
[1] Univ Calif Santa Cruz, Dept Comp Sci, Santa Cruz, CA 95064 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
cryptography; encryption; formal reasoning; provable security; soundness;
D O I
10.1007/s00145-001-0014-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Two distinct, rigorous views of cryptography have developed over the year:;, in two mostly separate communities. One of the views relies on a simple but effective formal approach; the other, on a detailed computational model that considers issues of complexity and probability. There is an uncomfortable and interesting gap between these two approaches to cryptography. This paper starts to bridge the gap, by providing a computational justification for a formal treatment of encryption.
引用
收藏
页码:103 / 127
页数:25
相关论文
共 47 条
[31]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[32]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299
[33]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208
[34]  
Gray J. W. III, 1995, Proceedings. The Eighth IEEE Computer Security Foundations Workshop (Cat. No.95TB8076), P108, DOI 10.1109/CSFW.1995.518557
[35]   Provable security for cryptographic protocols - Exact analysis and engineering applications [J].
Gray, JW ;
Ip, KFE ;
Lui, KS .
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, :45-58
[36]  
KEMMERER R, 1994, J CRYPTOL, V7, P79, DOI 10.1007/BF00197942
[38]  
LINCOLN P, 1998, P 5 ACM C COMP COMM, P112
[39]   I/O automaton models and proofs for shared-key communication systems [J].
Lynch, N .
PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, :14-29
[40]  
Meadows C., 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8), P182, DOI 10.1109/RISP.1991.130786