The Impossibility of Realizable Ideal Functionality

نویسندگان

  • Anupam Datta
  • John C. Mitchell
  • Ajith Ramanathan
  • Andre Scedrov
چکیده

A cryptographic primitive or a security mechanism can be specified in a variety of ways, such as a condition involving a game against an attacker, construction of an ideal functionality, or a list of properties that must hold in the face of attack. One reason that an ideal functionality is appealing is that if an implementation cannot be distinguished from an ideal functionality, by any feasible attack in any environment, then the mechanism is therefore secure in any larger system that uses it. We make accepted aspects of ideal functionality precise by relating ideal functionality to game specifications, and show that bit commitment, group signatures, and other cryptographic concepts do not have any realizable ideal functionality. This suggests that in order to develop composable security conditions, either alternative notions of ideal functionality must be developed, or another specification method must be used.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Games and the Impossibility of Realizable Ideal Functionality

A cryptographic primitive or a security mechanism can be specified in a variety of ways, such as a condition involving a game against an attacker, construction of an ideal functionality, or a list of properties that must hold in the face of attack. While game conditions are widely used, an ideal functionality is appealing because a mechanism that is indistinguishable from an ideal functionality...

متن کامل

Concurrent Secure Computation via Non-Black Box Simulation

Recently, Goyal (STOC’13) proposed a new non-black box simulation techniques for fully concurrent zero knowledge with straightline simulation. Unfortunately, so far this technique is limited to the setting of concurrent zero knowledge. The goal of this paper is to study what can be achieved in the setting of concurrent secure computation using non-black box simulation techniques, building upon ...

متن کامل

بررسی‌ مسیر‌های الکترون در لیزر الکترون آزاد با میدان ویگلر مارپیچی واقعی و کانال یونی راهنما

  A detailed analysis of electron trajectories in a realizable helical wiggler free electron laser with ion channel guiding using electron (single particle dynamics) is presented. Conditions for stability of electron orbit have been investigated, calculations are made to illustrate. Conclusion shows that there are differences stable (unstable) condition(s) electron trajectories between ideal he...

متن کامل

Lecture 16: Filter Design: Impulse Invariance and Bilinear Transform

– Filter, any modification of the signal according to design specifications. – Frequency selectivity – Causal filters (real time without delay) – Note ideal filters are not realizable. We can’t have perfect magnitude response. For example, the ideal low pass filter is not realizable because it requires infinite length sinc function. We would like causal filters: – IIR ok – FIR sometimes even be...

متن کامل

Error-Free Message Transmission in the Universal Composability Framework

This thesis introduces models for error-prone communication channels and functionalities for error-free communication in the Universal Composability framework. Realizing these functionalities enables protocols to make use of cryptographic errorcorrecting schemes which are more powerful than classical codes. First, we define new ideal functionalities TrCLOSE and FCWT to model error-prone communi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005