Confidentiality and Integrity: A Constructive Perspective View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Ueli Maurer , Andreas Rüedlinger , Björn Tackmann

ABSTRACT

Traditional security definitions in the context of secure communication specify properties of cryptographic schemes. For symmetric encryption schemes, these properties are intended to capture the protection of the confidentiality or the integrity of the encrypted messages. A vast variety of such definitions has emerged in the literature and, despite the efforts of previous work, the relations and interplay of many of these notions (which are a priori not composable) are unexplored. Also, the exact guarantees implied by the properties are hard to understand.In constructive cryptography, notions such as confidentiality and integrity appear as attributes of channels, i.e., the communication itself. This makes the guarantees achieved by cryptographic schemes explicit, and leads to security definitions that are composable.In this work, we follow the approach of constructive cryptography, questioning the justification for the existing (game-based) security definitions. In particular, we compare these definitions with related constructive notions and find that some are too weak, such as INT-PTXT, or artificially strong, such as INT-CTXT. Others appear unsuitable for symmetric encryption, such as IND-CCA. More... »

PAGES

209-229

Book

TITLE

Theory of Cryptography

ISBN

978-3-642-28913-2
978-3-642-28914-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_12

DOI

http://dx.doi.org/10.1007/978-3-642-28914-9_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1052367263


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maurer", 
        "givenName": "Ueli", 
        "id": "sg:person.01316567627.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "R\u00fcedlinger", 
        "givenName": "Andreas", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, ETH Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "Department of Computer Science, ETH Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tackmann", 
        "givenName": "Bj\u00f6rn", 
        "id": "sg:person.07617171521.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07617171521.69"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Traditional security definitions in the context of secure communication specify properties of cryptographic schemes. For symmetric encryption schemes, these properties are intended to capture the protection of the confidentiality or the integrity of the encrypted messages. A vast variety of such definitions has emerged in the literature and, despite the efforts of previous work, the relations and interplay of many of these notions (which are a priori not composable) are unexplored. Also, the exact guarantees implied by the properties are hard to understand.In constructive cryptography, notions such as confidentiality and integrity appear as attributes of channels, i.e., the communication itself. This makes the guarantees achieved by cryptographic schemes explicit, and leads to security definitions that are composable.In this work, we follow the approach of constructive cryptography, questioning the justification for the existing (game-based) security definitions. In particular, we compare these definitions with related constructive notions and find that some are too weak, such as INT-PTXT, or artificially strong, such as INT-CTXT. Others appear unsuitable for symmetric encryption, such as IND-CCA.", 
    "editor": [
      {
        "familyName": "Cramer", 
        "givenName": "Ronald", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-28914-9_12", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-28913-2", 
        "978-3-642-28914-9"
      ], 
      "name": "Theory of Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "security definitions", 
      "constructive cryptography", 
      "cryptographic schemes", 
      "symmetric encryption scheme", 
      "symmetric encryption", 
      "encryption scheme", 
      "IND-CCA", 
      "INT-CTXT", 
      "confidentiality", 
      "cryptography", 
      "guarantees", 
      "scheme", 
      "previous work", 
      "vast variety", 
      "constructive notion", 
      "encryption", 
      "such definitions", 
      "messages", 
      "constructive perspective", 
      "communication", 
      "definition", 
      "attributes", 
      "work", 
      "notion", 
      "integrity", 
      "context", 
      "efforts", 
      "channels", 
      "variety", 
      "perspective", 
      "protection", 
      "literature", 
      "justification", 
      "properties", 
      "relation", 
      "interplay", 
      "approach"
    ], 
    "name": "Confidentiality and Integrity: A Constructive Perspective", 
    "pagination": "209-229", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1052367263"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-28914-9_12"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-28914-9_12", 
      "https://app.dimensions.ai/details/publication/pub.1052367263"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:37", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_116.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-28914-9_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28914-9_12'


 

This table displays all metadata directly associated to this object as RDF triples.

110 TRIPLES      23 PREDICATES      63 URIs      56 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-28914-9_12 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N048281b1d7a54a45ba72bd09ab363d2f
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description Traditional security definitions in the context of secure communication specify properties of cryptographic schemes. For symmetric encryption schemes, these properties are intended to capture the protection of the confidentiality or the integrity of the encrypted messages. A vast variety of such definitions has emerged in the literature and, despite the efforts of previous work, the relations and interplay of many of these notions (which are a priori not composable) are unexplored. Also, the exact guarantees implied by the properties are hard to understand.In constructive cryptography, notions such as confidentiality and integrity appear as attributes of channels, i.e., the communication itself. This makes the guarantees achieved by cryptographic schemes explicit, and leads to security definitions that are composable.In this work, we follow the approach of constructive cryptography, questioning the justification for the existing (game-based) security definitions. In particular, we compare these definitions with related constructive notions and find that some are too weak, such as INT-PTXT, or artificially strong, such as INT-CTXT. Others appear unsuitable for symmetric encryption, such as IND-CCA.
7 schema:editor Nb3dd8975578c4526a12ddeac9a63802c
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N05026808096f428fbb3035de82f841dd
12 schema:keywords IND-CCA
13 INT-CTXT
14 approach
15 attributes
16 channels
17 communication
18 confidentiality
19 constructive cryptography
20 constructive notion
21 constructive perspective
22 context
23 cryptographic schemes
24 cryptography
25 definition
26 efforts
27 encryption
28 encryption scheme
29 guarantees
30 integrity
31 interplay
32 justification
33 literature
34 messages
35 notion
36 perspective
37 previous work
38 properties
39 protection
40 relation
41 scheme
42 security definitions
43 such definitions
44 symmetric encryption
45 symmetric encryption scheme
46 variety
47 vast variety
48 work
49 schema:name Confidentiality and Integrity: A Constructive Perspective
50 schema:pagination 209-229
51 schema:productId N673165ac17dc486dbe3cadd598bef7ad
52 Nd37d8b31235743ff9b5dadfedadbe5d9
53 schema:publisher N7aeaa881cd5c4bb3a42505cbd4605a6c
54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052367263
55 https://doi.org/10.1007/978-3-642-28914-9_12
56 schema:sdDatePublished 2022-05-10T10:37
57 schema:sdLicense https://scigraph.springernature.com/explorer/license/
58 schema:sdPublisher N388d4eb2b007441285e8631d60ec807c
59 schema:url https://doi.org/10.1007/978-3-642-28914-9_12
60 sgo:license sg:explorer/license/
61 sgo:sdDataset chapters
62 rdf:type schema:Chapter
63 N048281b1d7a54a45ba72bd09ab363d2f rdf:first sg:person.01316567627.91
64 rdf:rest Nd63a2777a83a4b3c857d72b00de97ee2
65 N05026808096f428fbb3035de82f841dd schema:isbn 978-3-642-28913-2
66 978-3-642-28914-9
67 schema:name Theory of Cryptography
68 rdf:type schema:Book
69 N388d4eb2b007441285e8631d60ec807c schema:name Springer Nature - SN SciGraph project
70 rdf:type schema:Organization
71 N42b8fa708bf84f56a362c2d177370896 schema:affiliation grid-institutes:grid.5801.c
72 schema:familyName Rüedlinger
73 schema:givenName Andreas
74 rdf:type schema:Person
75 N673165ac17dc486dbe3cadd598bef7ad schema:name dimensions_id
76 schema:value pub.1052367263
77 rdf:type schema:PropertyValue
78 N7aeaa881cd5c4bb3a42505cbd4605a6c schema:name Springer Nature
79 rdf:type schema:Organisation
80 N7bc6f78864f443c5a3937fec242ca7fb schema:familyName Cramer
81 schema:givenName Ronald
82 rdf:type schema:Person
83 Nacbda994bc5044a2acc5bb8b0db33f7b rdf:first sg:person.07617171521.69
84 rdf:rest rdf:nil
85 Nb3dd8975578c4526a12ddeac9a63802c rdf:first N7bc6f78864f443c5a3937fec242ca7fb
86 rdf:rest rdf:nil
87 Nd37d8b31235743ff9b5dadfedadbe5d9 schema:name doi
88 schema:value 10.1007/978-3-642-28914-9_12
89 rdf:type schema:PropertyValue
90 Nd63a2777a83a4b3c857d72b00de97ee2 rdf:first N42b8fa708bf84f56a362c2d177370896
91 rdf:rest Nacbda994bc5044a2acc5bb8b0db33f7b
92 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
93 schema:name Information and Computing Sciences
94 rdf:type schema:DefinedTerm
95 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
96 schema:name Data Format
97 rdf:type schema:DefinedTerm
98 sg:person.01316567627.91 schema:affiliation grid-institutes:grid.5801.c
99 schema:familyName Maurer
100 schema:givenName Ueli
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91
102 rdf:type schema:Person
103 sg:person.07617171521.69 schema:affiliation grid-institutes:grid.5801.c
104 schema:familyName Tackmann
105 schema:givenName Björn
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07617171521.69
107 rdf:type schema:Person
108 grid-institutes:grid.5801.c schema:alternateName Department of Computer Science, ETH Zürich, Switzerland
109 schema:name Department of Computer Science, ETH Zürich, Switzerland
110 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...