Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Conditional reactive simulatability

Published: 28 March 2008 Publication History

Abstract

Simulatability has established itself as a salient notion for defining and proving the security of cryptographic protocols since it entails strong security and compositionality guarantees, which are achieved by universally quantifying over all environmental behaviors of the analyzed protocol. As a consequence, however, protocols that are secure except for certain environmental behaviors are not simulatable, even if these behaviors are efficiently identifiable and thus can be prevented by the surrounding protocol. We propose a relaxation of simulatability by conditioning the permitted environmental behaviors, i.e., simulation is only required for environmental behaviors that fulfill explicitly stated constraints. This yields a more fine-grained security definition that is achievable for several protocols for which unconditional simulatability is too strict a notion, or at lower cost for the underlying cryptographic primitives. Although imposing restrictions on the environment destroys unconditional composability in general, we show that the composition of a large class of conditionally simulatable protocols yields protocols that are again simulatable under suitable conditions. This even holds for the case of cyclic assume-guarantee conditions where protocols only guarantee suitable behavior if they themselves are offered certain guarantees. Furthermore, composing several commonly investigated protocol classes with conditionally simulatable subprotocols yields protocols that are again simulatable in the standard, unconditional sense.

Cited By

View all
  • (2022)Embedding the UC Model into the IITM ModelAdvances in Cryptology – EUROCRYPT 202210.1007/978-3-031-07085-3_9(242-272)Online publication date: 30-May-2022
  • (2020)Oracle Simulation: A Technique for Protocol Composition with Long Term Shared SecretsProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417229(1427-1444)Online publication date: 30-Oct-2020
  • (2016)Universal Composition with Responsive EnvironmentsProceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 1003210.1007/978-3-662-53890-6_27(807-840)Online publication date: 4-Dec-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Information Security
International Journal of Information Security  Volume 7, Issue 2
March 2008
68 pages
ISSN:1615-5262
EISSN:1615-5270
Issue’s Table of Contents

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 28 March 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Embedding the UC Model into the IITM ModelAdvances in Cryptology – EUROCRYPT 202210.1007/978-3-031-07085-3_9(242-272)Online publication date: 30-May-2022
  • (2020)Oracle Simulation: A Technique for Protocol Composition with Long Term Shared SecretsProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3417229(1427-1444)Online publication date: 30-Oct-2020
  • (2016)Universal Composition with Responsive EnvironmentsProceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 1003210.1007/978-3-662-53890-6_27(807-840)Online publication date: 4-Dec-2016
  • (2011)Modular code-based cryptographic verificationProceedings of the 18th ACM conference on Computer and communications security10.1145/2046707.2046746(341-350)Online publication date: 17-Oct-2011

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media