z-logo
open-access-imgOpen Access
Decidability of a Sound Set of Inference Rules for Computational Indistinguishability
Author(s) -
Adrien Koutsos
Publication year - 2021
Publication title -
acm transactions on computational logic
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.593
H-Index - 52
eISSN - 1557-945X
pISSN - 1529-3785
DOI - 10.1145/3423169
Subject(s) - decidability , cryptographic protocol , axiom , theoretical computer science , cryptography , rewriting , cryptographic primitive , bounded function , mathematics , computer science , set (abstract data type) , encryption , property (philosophy) , rule of inference , automated theorem proving , discrete mathematics , algorithm , programming language , computer security , mathematical analysis , philosophy , geometry , epistemology
Computational indistinguishability is a key property in cryptography and verification of security protocols. Current tools for proving it rely on cryptographic game transformations. We follow Bana and Comon’s approach [7, 8], axiomatizing what an adversary cannot distinguish. We prove the decidability of a set of first-order axioms that are computationally sound, though incomplete, for protocols with a bounded number of sessions whose security is based on an IND-CCA2 encryption scheme. Alternatively, our result can be viewed as the decidability of a family of cryptographic game transformations. Our proof relies on term rewriting and automated deduction techniques.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom