Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Completeness theorems for the Abadi-Rogaway language of encrypted expressions

Published: 01 January 2004 Publication History

Abstract

We show that the Abadi-Rogaway logic of indistinguishability for cryptographic expressions is not complete by giving a natural example of a secure encryption function and a pair of expressions, such that the distributions associated to the two expressions are computationally indistinguishable, but equality cannot be proved within the logic. We then introduce a new property for encryption schemes, which we call confusion freeness, and show that the Abadi-Rogaway logic is sound and complete, whenever the encryption scheme used satisfies this property. We relate confusion freeness with standard cryptographic security notions, showing that any authenticated encryption scheme is confusion free. We also consider two extensions of the basic logic. The first is a refinement of the Abadi-Rogaway logic that overcomes certain limitations of the original proposal, allowing for encryption functions that do not hide the length of the message being sent. Both the soundness theorem of Abadi and Rogaway, and our completeness result for confusion free (or authenticated) encryption easily extend to this more realistic notion of secrecy. The second is an extension of the logic due to Abadi and Jürjens that allows to study more complex protocols in the presence of a passive adversary. Our completeness results holds for this extended logic as well.

Cited By

View all
  • (2012)Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsInformation Sciences: an International Journal10.1016/j.ins.2012.04.029209(93-112)Online publication date: 1-Nov-2012
  • (2011)A Survey of Symbolic Methods in Computational Analysis of Cryptographic SystemsJournal of Automated Reasoning10.1007/s10817-010-9187-946:3-4(225-259)Online publication date: 1-Apr-2011
  • (2010)Inductive trace properties for computational securityJournal of Computer Security10.5555/1891823.189182618:6(1035-1073)Online publication date: 21-Sep-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Computer Security
Journal of Computer Security  Volume 12, Issue 1
Special issue on WITS'02
January 2004
160 pages

Publisher

IOS Press

Netherlands

Publication History

Published: 01 January 2004

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsInformation Sciences: an International Journal10.1016/j.ins.2012.04.029209(93-112)Online publication date: 1-Nov-2012
  • (2011)A Survey of Symbolic Methods in Computational Analysis of Cryptographic SystemsJournal of Automated Reasoning10.1007/s10817-010-9187-946:3-4(225-259)Online publication date: 1-Apr-2011
  • (2010)Inductive trace properties for computational securityJournal of Computer Security10.5555/1891823.189182618:6(1035-1073)Online publication date: 21-Sep-2010
  • (2010)Computationally sound analysis of protocols using bilinear pairingsJournal of Computer Security10.5555/1891823.189182518:6(999-1033)Online publication date: 21-Sep-2010
  • (2010)Conditional automataProceedings of the 21st international conference on Concurrency theory10.5555/1887654.1887691(539-553)Online publication date: 31-Aug-2010
  • (2010)Guessing attacks and the computational soundness of static equivalenceJournal of Computer Security10.5555/1841962.184196918:5(909-968)Online publication date: 1-Sep-2010
  • (2010)Deciding security properties for cryptographic protocols. application to key cyclesACM Transactions on Computational Logic10.1145/1656242.165624411:2(1-42)Online publication date: 22-Jan-2010
  • (2010)On symmetric encryption and point obfuscationProceedings of the 7th international conference on Theory of Cryptography10.1007/978-3-642-11799-2_4(52-71)Online publication date: 9-Feb-2010
  • (2009)Soundness and completeness of formal encryption: The cases of key cycles and partial information leakageJournal of Computer Security10.5555/1662658.166266517:5(737-797)Online publication date: 1-Oct-2009
  • (2009)Computationally sound implementations of equational theories against passive adversariesInformation and Computation10.1016/j.ic.2008.12.005207:4(496-520)Online publication date: 1-Apr-2009
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media