{"title":"论计算无差别性与逻辑关系","authors":"Ugo Dal Lago, Zeinab Galal, Giulia Giusti","doi":"arxiv-2408.17340","DOIUrl":null,"url":null,"abstract":"A $\\lambda$-calculus is introduced in which all programs can be evaluated in\nprobabilistic polynomial time and in which there is sufficient structure to\nrepresent sequential cryptographic constructions and adversaries for them, even\nwhen the latter are oracle-based. A notion of observational equivalence\ncapturing computational indistinguishability and a class of approximate logical\nrelations are then presented, showing that the latter represent a sound proof\ntechnique for the former. The work concludes with the presentation of an\nexample of a security proof in which the encryption scheme induced by a\npseudorandom function is proven secure against active adversaries in a purely\nequational style.","PeriodicalId":501197,"journal":{"name":"arXiv - CS - Programming Languages","volume":"27 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On Computational Indistinguishability and Logical Relations\",\"authors\":\"Ugo Dal Lago, Zeinab Galal, Giulia Giusti\",\"doi\":\"arxiv-2408.17340\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A $\\\\lambda$-calculus is introduced in which all programs can be evaluated in\\nprobabilistic polynomial time and in which there is sufficient structure to\\nrepresent sequential cryptographic constructions and adversaries for them, even\\nwhen the latter are oracle-based. A notion of observational equivalence\\ncapturing computational indistinguishability and a class of approximate logical\\nrelations are then presented, showing that the latter represent a sound proof\\ntechnique for the former. The work concludes with the presentation of an\\nexample of a security proof in which the encryption scheme induced by a\\npseudorandom function is proven secure against active adversaries in a purely\\nequational style.\",\"PeriodicalId\":501197,\"journal\":{\"name\":\"arXiv - CS - Programming Languages\",\"volume\":\"27 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Programming Languages\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2408.17340\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Programming Languages","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2408.17340","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On Computational Indistinguishability and Logical Relations
A $\lambda$-calculus is introduced in which all programs can be evaluated in
probabilistic polynomial time and in which there is sufficient structure to
represent sequential cryptographic constructions and adversaries for them, even
when the latter are oracle-based. A notion of observational equivalence
capturing computational indistinguishability and a class of approximate logical
relations are then presented, showing that the latter represent a sound proof
technique for the former. The work concludes with the presentation of an
example of a security proof in which the encryption scheme induced by a
pseudorandom function is proven secure against active adversaries in a purely
equational style.