thesis/chap-proofs.tex

25 lines
1.1 KiB
TeX
Raw Normal View History

2018-01-15 11:56:09 +00:00
\chapter{Security Proofs in Cryptography}
2018-01-23 14:34:12 +00:00
Provable security is a subfield of cryptography where constructions are proven secure with regards to a security model.
To illustrate this notion, let us take the example of public-key encryption schemes.
This primitive consists in three algorithms:~key generation, encryption and decryption.
These algorithms acts according to their names.
Then, the question of ``how to define the security of this set of algorithms'' rises.
To answer this question, we have to define the power of the adversary, and its goal.
To model those two notions, cryptographers uses security games.
%%%%%%%%%%%%%%%%%%%%%%%
% Security Reductions %
%%%%%%%%%%%%%%%%%%%%%%%
2018-01-15 11:56:09 +00:00
\section{Security Reductions}
2018-01-23 14:34:12 +00:00
Provable security focuses on providing constructions for which the security is guaranteed by a security proof, or security reduction.
These proofs consist in polynomial reductions from difficult problems: the hardness assumptions.
The quality of a proof depends on the security of the hardness assumption, and the tightness of the proof.
2018-01-15 11:56:09 +00:00
\section{Random-Oracle Model and Standard Model}