Constructive Cryptography – A New Paradigm for Security Definitions and Proofs View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Ueli Maurer

ABSTRACT

Constructive cryptography, an application of abstract cryptography proposed by Maurer and Renner, is a new paradigm for defining the security of cryptographic schemes such as symmetric encryption, message authentication codes, public-key encryption, key-agreement protocols, and digital signature schemes, and for proving the security of protocols making use of such schemes. Such a cryptographic scheme can be seen (and defined) as constructing a certain resource (e.g. a channel or key) with certain security properties from another (weaker) such resource. For example, a secure encryption scheme constructs a secure channel from an authenticated channel and a secret key.The term “construct”, which is defined by the use of a simulator, is composable in the sense that a protocol obtained by the composition of several secure constructive steps is itself secure. This is in contrast to both the traditional, game-based security definitions for cryptographic schemes and the attack-based security definitions used in formal-methods based security research, which are generally not composable.Constructive cryptography allows to take a new look at cryptography and the design of cryptographic protocols. One can give explicit meaning to various types of game-based security notions of confidentiality, integrity, and malleability, one can design key agreement, secure communication, certification, and other protocols in a modular and composable manner, and one can separate the understanding of what cryptography achieves from the technical security definitions and proofs, which is useful for didactic purposes and protocol design. More... »

PAGES

33-56

Book

TITLE

Theory of Security and Applications

ISBN

978-3-642-27374-2
978-3-642-27375-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-27375-9_3

DOI

http://dx.doi.org/10.1007/978-3-642-27375-9_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1046397209


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Zurich, CH-8092, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Zurich, CH-8092, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maurer", 
        "givenName": "Ueli", 
        "id": "sg:person.01316567627.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Constructive cryptography, an application of abstract cryptography proposed by Maurer and Renner, is a new paradigm for defining the security of cryptographic schemes such as symmetric encryption, message authentication codes, public-key encryption, key-agreement protocols, and digital signature schemes, and for proving the security of protocols making use of such schemes. Such a cryptographic scheme can be seen (and defined) as constructing a certain resource (e.g. a channel or key) with certain security properties from another (weaker) such resource. For example, a secure encryption scheme constructs a secure channel from an authenticated channel and a secret key.The term \u201cconstruct\u201d, which is defined by the use of a simulator, is composable in the sense that a protocol obtained by the composition of several secure constructive steps is itself secure. This is in contrast to both the traditional, game-based security definitions for cryptographic schemes and the attack-based security definitions used in formal-methods based security research, which are generally not composable.Constructive cryptography allows to take a new look at cryptography and the design of cryptographic protocols. One can give explicit meaning to various types of game-based security notions of confidentiality, integrity, and malleability, one can design key agreement, secure communication, certification, and other protocols in a modular and composable manner, and one can separate the understanding of what cryptography achieves from the technical security definitions and proofs, which is useful for didactic purposes and protocol design.", 
    "editor": [
      {
        "familyName": "M\u00f6dersheim", 
        "givenName": "Sebastian", 
        "type": "Person"
      }, 
      {
        "familyName": "Palamidessi", 
        "givenName": "Catuscia", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-27375-9_3", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-27374-2", 
        "978-3-642-27375-9"
      ], 
      "name": "Theory of Security and Applications", 
      "type": "Book"
    }, 
    "keywords": [
      "security definitions", 
      "constructive cryptography", 
      "cryptographic schemes", 
      "game-based security definitions", 
      "message authentication code", 
      "secure encryption scheme", 
      "public key encryption", 
      "digital signature scheme", 
      "certain security properties", 
      "security of protocols", 
      "key agreement protocol", 
      "new paradigm", 
      "symmetric encryption", 
      "secure channel", 
      "security properties", 
      "encryption scheme", 
      "cryptographic protocols", 
      "abstract cryptography", 
      "authentication code", 
      "security notions", 
      "key agreement", 
      "composable manner", 
      "secure communication", 
      "secret key", 
      "security research", 
      "cryptography", 
      "signature scheme", 
      "protocol design", 
      "encryption", 
      "certain resources", 
      "such resources", 
      "such schemes", 
      "security", 
      "scheme", 
      "explicit meaning", 
      "constructive steps", 
      "protocol", 
      "paradigm", 
      "confidentiality", 
      "resources", 
      "simulator", 
      "proof", 
      "didactic purposes", 
      "code", 
      "communication", 
      "design", 
      "definition", 
      "key", 
      "Maurer", 
      "applications", 
      "channels", 
      "example", 
      "use", 
      "step", 
      "certification", 
      "notion", 
      "research", 
      "look", 
      "terms", 
      "manner", 
      "integrity", 
      "sense", 
      "purpose", 
      "meaning", 
      "constructs", 
      "new look", 
      "Renner", 
      "types", 
      "malleability", 
      "understanding", 
      "properties", 
      "contrast", 
      "agreement", 
      "composition"
    ], 
    "name": "Constructive Cryptography \u2013 A New Paradigm for Security Definitions and Proofs", 
    "pagination": "33-56", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1046397209"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-27375-9_3"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-27375-9_3", 
      "https://app.dimensions.ai/details/publication/pub.1046397209"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:36", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_107.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-27375-9_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27375-9_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27375-9_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27375-9_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27375-9_3'


 

This table displays all metadata directly associated to this object as RDF triples.

143 TRIPLES      23 PREDICATES      101 URIs      93 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-27375-9_3 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 anzsrc-for:0804
4 schema:author N9b6c3fd0340543779b702282082eaf24
5 schema:datePublished 2012
6 schema:datePublishedReg 2012-01-01
7 schema:description Constructive cryptography, an application of abstract cryptography proposed by Maurer and Renner, is a new paradigm for defining the security of cryptographic schemes such as symmetric encryption, message authentication codes, public-key encryption, key-agreement protocols, and digital signature schemes, and for proving the security of protocols making use of such schemes. Such a cryptographic scheme can be seen (and defined) as constructing a certain resource (e.g. a channel or key) with certain security properties from another (weaker) such resource. For example, a secure encryption scheme constructs a secure channel from an authenticated channel and a secret key.The term “construct”, which is defined by the use of a simulator, is composable in the sense that a protocol obtained by the composition of several secure constructive steps is itself secure. This is in contrast to both the traditional, game-based security definitions for cryptographic schemes and the attack-based security definitions used in formal-methods based security research, which are generally not composable.Constructive cryptography allows to take a new look at cryptography and the design of cryptographic protocols. One can give explicit meaning to various types of game-based security notions of confidentiality, integrity, and malleability, one can design key agreement, secure communication, certification, and other protocols in a modular and composable manner, and one can separate the understanding of what cryptography achieves from the technical security definitions and proofs, which is useful for didactic purposes and protocol design.
8 schema:editor Neafaee403ad24fd19d9ec159dbca90ac
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree true
12 schema:isPartOf N954777b603a74ee3a93e360409ec02b6
13 schema:keywords Maurer
14 Renner
15 abstract cryptography
16 agreement
17 applications
18 authentication code
19 certain resources
20 certain security properties
21 certification
22 channels
23 code
24 communication
25 composable manner
26 composition
27 confidentiality
28 constructive cryptography
29 constructive steps
30 constructs
31 contrast
32 cryptographic protocols
33 cryptographic schemes
34 cryptography
35 definition
36 design
37 didactic purposes
38 digital signature scheme
39 encryption
40 encryption scheme
41 example
42 explicit meaning
43 game-based security definitions
44 integrity
45 key
46 key agreement
47 key agreement protocol
48 look
49 malleability
50 manner
51 meaning
52 message authentication code
53 new look
54 new paradigm
55 notion
56 paradigm
57 proof
58 properties
59 protocol
60 protocol design
61 public key encryption
62 purpose
63 research
64 resources
65 scheme
66 secret key
67 secure channel
68 secure communication
69 secure encryption scheme
70 security
71 security definitions
72 security notions
73 security of protocols
74 security properties
75 security research
76 sense
77 signature scheme
78 simulator
79 step
80 such resources
81 such schemes
82 symmetric encryption
83 terms
84 types
85 understanding
86 use
87 schema:name Constructive Cryptography – A New Paradigm for Security Definitions and Proofs
88 schema:pagination 33-56
89 schema:productId N5e08d8e926684b6eb06268c4b96e4345
90 Nc12641eecdfc4ec58ecdcb44b9d3b32e
91 schema:publisher N1aa0aee1078148699e148379e78359eb
92 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046397209
93 https://doi.org/10.1007/978-3-642-27375-9_3
94 schema:sdDatePublished 2022-05-10T10:36
95 schema:sdLicense https://scigraph.springernature.com/explorer/license/
96 schema:sdPublisher N74740638057e429ab65878cd6caec75c
97 schema:url https://doi.org/10.1007/978-3-642-27375-9_3
98 sgo:license sg:explorer/license/
99 sgo:sdDataset chapters
100 rdf:type schema:Chapter
101 N1aa0aee1078148699e148379e78359eb schema:name Springer Nature
102 rdf:type schema:Organisation
103 N21abadfe419b42e791713764ac6b1022 schema:familyName Mödersheim
104 schema:givenName Sebastian
105 rdf:type schema:Person
106 N39cb38482fd4493d81448ddd448a6d17 rdf:first Nda2c04a1388d4d10b13dd26cceecd14d
107 rdf:rest rdf:nil
108 N5e08d8e926684b6eb06268c4b96e4345 schema:name dimensions_id
109 schema:value pub.1046397209
110 rdf:type schema:PropertyValue
111 N74740638057e429ab65878cd6caec75c schema:name Springer Nature - SN SciGraph project
112 rdf:type schema:Organization
113 N954777b603a74ee3a93e360409ec02b6 schema:isbn 978-3-642-27374-2
114 978-3-642-27375-9
115 schema:name Theory of Security and Applications
116 rdf:type schema:Book
117 N9b6c3fd0340543779b702282082eaf24 rdf:first sg:person.01316567627.91
118 rdf:rest rdf:nil
119 Nc12641eecdfc4ec58ecdcb44b9d3b32e schema:name doi
120 schema:value 10.1007/978-3-642-27375-9_3
121 rdf:type schema:PropertyValue
122 Nda2c04a1388d4d10b13dd26cceecd14d schema:familyName Palamidessi
123 schema:givenName Catuscia
124 rdf:type schema:Person
125 Neafaee403ad24fd19d9ec159dbca90ac rdf:first N21abadfe419b42e791713764ac6b1022
126 rdf:rest N39cb38482fd4493d81448ddd448a6d17
127 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
128 schema:name Information and Computing Sciences
129 rdf:type schema:DefinedTerm
130 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
131 schema:name Computation Theory and Mathematics
132 rdf:type schema:DefinedTerm
133 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
134 schema:name Data Format
135 rdf:type schema:DefinedTerm
136 sg:person.01316567627.91 schema:affiliation grid-institutes:grid.5801.c
137 schema:familyName Maurer
138 schema:givenName Ueli
139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91
140 rdf:type schema:Person
141 grid-institutes:grid.5801.c schema:alternateName Department of Computer Science, ETH Zurich, CH-8092, Zurich, Switzerland
142 schema:name Department of Computer Science, ETH Zurich, CH-8092, Zurich, Switzerland
143 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...