Introduction to Cryptographic Protocols

نویسنده

  • Claude Crépeau
چکیده

1 : x||y String x is concatenated with string y. 2 : λ(C) Distribution of a given instance or random variable C. 3 : D(X, Y) Statistical distance between the distributions of the two random variables X and Y. 6 : = Stat Statistical indistinguishability between two Random Variables: see Definition 8. 7 : = Comp Computational indistinguishability between two Random Variables: see Definition 9. 8 : Protocol proving equality between two bit commitments: b 0 b 1 , the commitment protocol is implied by the flavor of the commitments used. 9 : ↔ When commitment a is unveiled, it is accepted by the receiver as a valid commitment to the value b : a ↔ b. 10 : U (·) The operator U is a shorthand notation representing all the info necessary to unveil a given value: U (a) is all the information necessary such that the receiver can verify that a ↔ a. 11 : U n Uniform random variable over a set of n elements or 2 n elements, the meaning will be clear from the context. 12 : Pr[A(x) = y] Probability that probabilistic algorithm A outputs y given x. 13 : Pr x [A(x) = y] Average probability, over all x that probabilistic algorithm A outputs y given x : Pr x [A(x) = y] = x p x Pr[A(x) = y]. 1 : Statistical Distance Let X and Y be two random variables over the same set {x} x , then D(X, Y) =

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Type-Based Automated Verification of Authenticity in Cryptographic Protocols

Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the type checking problem, but protocols must be manually annotated with non-trivial types and effects. To automate the verification of cryptographic protocols, we modify Gordon and Jeffrey’s type system and develop a type i...

متن کامل

Commitment Schemes and Zero-Knowledge Protocols

This article is an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-knowledge protocols, and a survey of some new and old results on their existence and the connection between them. 1 What’s in this article? This article contains an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-kno...

متن کامل

Commitment Schemes and Zero - Knowledge Protocols ( 2008 ) Ivan Damg̊ard

This article is an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-knowledge protocols, and a survey of some new and old results on their existence and the connection between them. 1 What’s in this article? This article contains an introduction to two fundamental primitives in cryptographic protocol theory: commitment schemes and zero-kno...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012