Computationally Sound Symbolic Secrecy in the Presence of Hash Functions

Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

31 Citations (Scopus)

Abstract

The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper we devise and motivate a more appropriate secrecy criterion which exactly captures a standard cryptographic notion of secrecy for protocols involving public-key enryption and hash functions: protocols that satisfy it are computationally secure while any violation of our criterion directly leads to an attack. Furthermore, we prove that our criterion is decidable via an NP decision procedure. Our results hold for standard security notions for encryption and hash functions modeled as random oracles.
Translated title of the contributionComputationally Sound Symbolic Secrecy in the Presence of Hash Functions
Original languageEnglish
Title of host publication Foundations of Software Technology and Theoretical Computer Science - FSTTCS 2006
PublisherSpringer Berlin Heidelberg
Pages176-187
Volume4337
Publication statusPublished - 2006

Bibliographical note

Other page information: -
Conference Proceedings/Title of Journal: Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science -- FSTTCS'06
Other identifier: 2000658

Fingerprint

Dive into the research topics of 'Computationally Sound Symbolic Secrecy in the Presence of Hash Functions'. Together they form a unique fingerprint.

Cite this