Towards a formal treatment of secrecy against computational adversaries

  • Authors:
  • Angelo Troina;Alessandro Aldini;Roberto Gorrieri

  • Affiliations:
  • Dipartimento di Informatica, University of Pisa, Pisa, Italy;Istituto STI, University of Urbino, Urbino, Italy;Dipartimento di Scienze dell'Informazione, University of Bologna, Bologna, Italy

  • Venue:
  • GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Polynomial time adversaries based on a computational view of cryptography have additional capabilities that the classical Dolev-Yao adversary model does not include. To relate these two different models of cryptography, in this paper we enrich a formal model for cryptographic expressions, originally based on the Dolev-Yao assumptions, with computational aspects based on notions of probability and computational power. The obtained result is that if the cryptosystem is robust enough, then the two adversary models turn out to be equivalent. As an application of our approach, we show how to determine a secrecy property against the computational adversary.