Probabilistic relational hoare logics for computer-aided security proofs

  • Authors:
  • Gilles Barthe;Benjamin Grégoire;Santiago Zanella Béguelin

  • Affiliations:
  • IMDEA Software Institute, France;INRIA Sophia Antipolis - Méditerranée, France;Microsoft Research, France

  • Venue:
  • MPC'12 Proceedings of the 11th international conference on Mathematics of Program Construction
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Provable security. The goal of provable security is to verify rigorously the security of cryptographic systems. A provable security argument proceeds in three steps: 1 Define a security goal and an adversarial model; 2 Define the cryptographic system and the security assumptions upon which the security of the system hinges; 3Show by reduction that any attack against the cryptographic system can be used to build an efficient algorithm that breaks a security assumption.