Introduction to Cryptographic Protocols
نویسنده
چکیده
1 : x||y String x is concatenated with string y. 2 : λ(C) Distribution of a given instance or random variable C. 3 : D(X, Y) Statistical distance between the distributions of the two random variables X and Y. 6 : = Stat Statistical indistinguishability between two Random Variables: see Definition 8. 7 : = Comp Computational indistinguishability between two Random Variables: see Definition 9. 8 : Protocol proving equality between two bit commitments: b 0 b 1 , the commitment protocol is implied by the flavor of the commitments used. 9 : ↔ When commitment a is unveiled, it is accepted by the receiver as a valid commitment to the value b : a ↔ b. 10 : U (·) The operator U is a shorthand notation representing all the info necessary to unveil a given value: U (a) is all the information necessary such that the receiver can verify that a ↔ a. 11 : U n Uniform random variable over a set of n elements or 2 n elements, the meaning will be clear from the context. 12 : Pr[A(x) = y] Probability that probabilistic algorithm A outputs y given x. 13 : Pr x [A(x) = y] Average probability, over all x that probabilistic algorithm A outputs y given x : Pr x [A(x) = y] = x p x Pr[A(x) = y]. 1 : Statistical Distance Let X and Y be two random variables over the same set {x} x , then D(X, Y) =
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملType-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the type checking problem, but protocols must be manually annotated with non-trivial types and effects. To automate the verification of cryptographic protocols, we modify Gordon and Jeffrey’s type system and develop a type i...
متن کاملCommitment Schemes and Zero-Knowledge Protocols
This article is an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-knowledge protocols, and a survey of some new and old results on their existence and the connection between them. 1 What’s in this article? This article contains an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-kno...
متن کاملCommitment Schemes and Zero - Knowledge Protocols ( 2008 ) Ivan Damg̊ard
This article is an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-knowledge protocols, and a survey of some new and old results on their existence and the connection between them. 1 What’s in this article? This article contains an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-kno...
متن کامل