A Brief Introduction to Provable Security

A recurring question when we design a cryptographic scheme is how to determine its security level. The provable security is a technique that can help to answer this question. In this paper we present a friendly introduction of this technique by analyzing a cryptographic scheme in the private-key set...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Revista IEEE América Latina 2016-05, Vol.14 (5), p.2323-2332
Hauptverfasser: Diaz Santiago, Sandra, Gallegos Garcia, Gina, Rodriguez Henriquez, Lil Maria, Cruz Cortes, Nareli
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2332
container_issue 5
container_start_page 2323
container_title Revista IEEE América Latina
container_volume 14
creator Diaz Santiago, Sandra
Gallegos Garcia, Gina
Rodriguez Henriquez, Lil Maria
Cruz Cortes, Nareli
description A recurring question when we design a cryptographic scheme is how to determine its security level. The provable security is a technique that can help to answer this question. In this paper we present a friendly introduction of this technique by analyzing a cryptographic scheme in the private-key setting, also we briefly discuss some alternatives to provable security, and finally we point out some open problems and possible research directions.
doi_str_mv 10.1109/TLA.2016.7530429
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1808974229</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7530429</ieee_id><sourcerecordid>4138058361</sourcerecordid><originalsourceid>FETCH-LOGICAL-c254t-96faec30da9873e92c0a4bd1328cbe4ae6fb43c66260356d9299d94361b4c8853</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsFbvgpeAFz2k7le2O8da_CgEFKznZbOZQEqarbuJ0H_flFYRT_PCPO8wPIRcMzphjMLDMp9NOGVqMs0ElRxOyIhlUqcUgJ_-yefkIsYVpUIrLUbkfpY8hhqrZNF2wZe962rfJp1P3oP_tkWDyQe6PtTd9pKcVbaJeHWcY_L5_LScv6b528tiPstTxzPZpaAqi07Q0oKeCgTuqJVFyQTXrkBpUVWFFE4prqjIVAkcoAQpFCuk0zoTY3J3uLsJ_qvH2Jl1HR02jW3R99EwPdQYz9Qevf2Hrnwf2uG7gaIappJzGCh6oFzwMQaszCbUaxu2hlGzd2cGd2bvzhzdDZWbQ6VGxF_8Z7sD7kBnvw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1808974229</pqid></control><display><type>article</type><title>A Brief Introduction to Provable Security</title><source>IEEE Electronic Library (IEL)</source><creator>Diaz Santiago, Sandra ; Gallegos Garcia, Gina ; Rodriguez Henriquez, Lil Maria ; Cruz Cortes, Nareli</creator><creatorcontrib>Diaz Santiago, Sandra ; Gallegos Garcia, Gina ; Rodriguez Henriquez, Lil Maria ; Cruz Cortes, Nareli</creatorcontrib><description>A recurring question when we design a cryptographic scheme is how to determine its security level. The provable security is a technique that can help to answer this question. In this paper we present a friendly introduction of this technique by analyzing a cryptographic scheme in the private-key setting, also we briefly discuss some alternatives to provable security, and finally we point out some open problems and possible research directions.</description><identifier>ISSN: 1548-0992</identifier><identifier>EISSN: 1548-0992</identifier><identifier>DOI: 10.1109/TLA.2016.7530429</identifier><language>eng</language><publisher>Los Alamitos: IEEE</publisher><subject>chosen plaintext attack ; Cryptography ; Design analysis ; Internet ; Irrigation ; provable security ; pseudorandom functions ; random oracle model ; Security ; Silicon compounds ; Surges</subject><ispartof>Revista IEEE América Latina, 2016-05, Vol.14 (5), p.2323-2332</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c254t-96faec30da9873e92c0a4bd1328cbe4ae6fb43c66260356d9299d94361b4c8853</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7530429$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7530429$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Diaz Santiago, Sandra</creatorcontrib><creatorcontrib>Gallegos Garcia, Gina</creatorcontrib><creatorcontrib>Rodriguez Henriquez, Lil Maria</creatorcontrib><creatorcontrib>Cruz Cortes, Nareli</creatorcontrib><title>A Brief Introduction to Provable Security</title><title>Revista IEEE América Latina</title><addtitle>T-LA</addtitle><description>A recurring question when we design a cryptographic scheme is how to determine its security level. The provable security is a technique that can help to answer this question. In this paper we present a friendly introduction of this technique by analyzing a cryptographic scheme in the private-key setting, also we briefly discuss some alternatives to provable security, and finally we point out some open problems and possible research directions.</description><subject>chosen plaintext attack</subject><subject>Cryptography</subject><subject>Design analysis</subject><subject>Internet</subject><subject>Irrigation</subject><subject>provable security</subject><subject>pseudorandom functions</subject><subject>random oracle model</subject><subject>Security</subject><subject>Silicon compounds</subject><subject>Surges</subject><issn>1548-0992</issn><issn>1548-0992</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1Lw0AQhhdRsFbvgpeAFz2k7le2O8da_CgEFKznZbOZQEqarbuJ0H_flFYRT_PCPO8wPIRcMzphjMLDMp9NOGVqMs0ElRxOyIhlUqcUgJ_-yefkIsYVpUIrLUbkfpY8hhqrZNF2wZe962rfJp1P3oP_tkWDyQe6PtTd9pKcVbaJeHWcY_L5_LScv6b528tiPstTxzPZpaAqi07Q0oKeCgTuqJVFyQTXrkBpUVWFFE4prqjIVAkcoAQpFCuk0zoTY3J3uLsJ_qvH2Jl1HR02jW3R99EwPdQYz9Qevf2Hrnwf2uG7gaIappJzGCh6oFzwMQaszCbUaxu2hlGzd2cGd2bvzhzdDZWbQ6VGxF_8Z7sD7kBnvw</recordid><startdate>20160501</startdate><enddate>20160501</enddate><creator>Diaz Santiago, Sandra</creator><creator>Gallegos Garcia, Gina</creator><creator>Rodriguez Henriquez, Lil Maria</creator><creator>Cruz Cortes, Nareli</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>20160501</creationdate><title>A Brief Introduction to Provable Security</title><author>Diaz Santiago, Sandra ; Gallegos Garcia, Gina ; Rodriguez Henriquez, Lil Maria ; Cruz Cortes, Nareli</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c254t-96faec30da9873e92c0a4bd1328cbe4ae6fb43c66260356d9299d94361b4c8853</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>chosen plaintext attack</topic><topic>Cryptography</topic><topic>Design analysis</topic><topic>Internet</topic><topic>Irrigation</topic><topic>provable security</topic><topic>pseudorandom functions</topic><topic>random oracle model</topic><topic>Security</topic><topic>Silicon compounds</topic><topic>Surges</topic><toplevel>online_resources</toplevel><creatorcontrib>Diaz Santiago, Sandra</creatorcontrib><creatorcontrib>Gallegos Garcia, Gina</creatorcontrib><creatorcontrib>Rodriguez Henriquez, Lil Maria</creatorcontrib><creatorcontrib>Cruz Cortes, Nareli</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>Revista IEEE América Latina</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Diaz Santiago, Sandra</au><au>Gallegos Garcia, Gina</au><au>Rodriguez Henriquez, Lil Maria</au><au>Cruz Cortes, Nareli</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Brief Introduction to Provable Security</atitle><jtitle>Revista IEEE América Latina</jtitle><stitle>T-LA</stitle><date>2016-05-01</date><risdate>2016</risdate><volume>14</volume><issue>5</issue><spage>2323</spage><epage>2332</epage><pages>2323-2332</pages><issn>1548-0992</issn><eissn>1548-0992</eissn><abstract>A recurring question when we design a cryptographic scheme is how to determine its security level. The provable security is a technique that can help to answer this question. In this paper we present a friendly introduction of this technique by analyzing a cryptographic scheme in the private-key setting, also we briefly discuss some alternatives to provable security, and finally we point out some open problems and possible research directions.</abstract><cop>Los Alamitos</cop><pub>IEEE</pub><doi>10.1109/TLA.2016.7530429</doi><tpages>10</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1548-0992
ispartof Revista IEEE América Latina, 2016-05, Vol.14 (5), p.2323-2332
issn 1548-0992
1548-0992
language eng
recordid cdi_proquest_journals_1808974229
source IEEE Electronic Library (IEL)
subjects chosen plaintext attack
Cryptography
Design analysis
Internet
Irrigation
provable security
pseudorandom functions
random oracle model
Security
Silicon compounds
Surges
title A Brief Introduction to Provable Security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T15%3A24%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Brief%20Introduction%20to%20Provable%20Security&rft.jtitle=Revista%20IEEE%20Am%C3%A9rica%20Latina&rft.au=Diaz%20Santiago,%20Sandra&rft.date=2016-05-01&rft.volume=14&rft.issue=5&rft.spage=2323&rft.epage=2332&rft.pages=2323-2332&rft.issn=1548-0992&rft.eissn=1548-0992&rft_id=info:doi/10.1109/TLA.2016.7530429&rft_dat=%3Cproquest_RIE%3E4138058361%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1808974229&rft_id=info:pmid/&rft_ieee_id=7530429&rfr_iscdi=true