Computational soundness of observational equivalence - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Rapport (Rapport De Recherche) Année : 2008

Computational soundness of observational equivalence

Résumé

Many security properties are naturally expressed as indistinguishability between two versions of a protocol. In this paper, we show that computational proofs of indistinguishability can be considerably simplified, for a class of processes that covers most existing protocols. More precisely, we show a soundness theorem, following the line of research launched by Abadi and Rogaway in 2000: computational indistinguishability in presence of an active attacker is implied by the observational equivalence of the corresponding symbolic processes. Up to our knowledge, the only result of this kind is Adao and Fournet, in which, however, cryptographic primitives are not part of the syntax. Otherwise, previous works either considered a passive attacker, or, in case of active attackers, proved a soundness result for properties that can be defined on execution traces of the protocol. Anonymity for instance does not fall in the latter category. We prove our result for symmetric encryption, but the same techniques can be applied to other security primitives such as signatures and public-key encryption. The proof requires the introduction of new concepts, which are general and can be reused in other settings.
Fichier principal
Vignette du fichier
rapport.pdf (428.5 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

inria-00274158 , version 1 (17-04-2008)
inria-00274158 , version 2 (21-04-2008)

Identifiants

  • HAL Id : inria-00274158 , version 1

Citer

Hubert Comon-Lundh, Véronique Cortier. Computational soundness of observational equivalence. [Research Report] 2008. ⟨inria-00274158v1⟩
168 Consultations
412 Téléchargements

Partager

Gmail Facebook X LinkedIn More