Modeling Computational Security in Long-Lived Systems, Version 2

For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are l...

Full description

Bibliographic Details
Main Authors: Lynch, Nancy, Pereira, Olivier, Kaynar, Dilsun, Cheung, Ling, Canetti, Ran
Other Authors: Nancy Lynch
Published: 2008
Online Access:http://hdl.handle.net/1721.1/43711
_version_ 1826202816685801472
author Lynch, Nancy
Pereira, Olivier
Kaynar, Dilsun
Cheung, Ling
Canetti, Ran
author2 Nancy Lynch
author_facet Nancy Lynch
Lynch, Nancy
Pereira, Olivier
Kaynar, Dilsun
Cheung, Ling
Canetti, Ran
author_sort Lynch, Nancy
collection MIT
description For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., super-polynomial). In such cases, security cannot be guaranteed in the traditional sense: a computationally secure protocol may become insecure if the attacker has a super-polynomial number of interactions with the protocol. This paper proposes a new paradigm for the analysis of long-lived security protocols. We allow entities to be active for a potentially unbounded amount of real time, provided they perform only a polynomial amount of work per unit of real time. Moreover, the space used by these entities is allocated dynamically and must be polynomially bounded. We propose a new notion of long-term implementation, which is an adaptation of computational indistinguishability to the long-lived setting. We show that long-term implementation is preserved under polynomial parallel composition and exponential sequential composition. We illustrate the use of this new paradigm by analyzing some security properties of the long-lived timestamping protocol of Haber and Kamat.
first_indexed 2024-09-23T12:19:49Z
id mit-1721.1/43711
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T12:19:49Z
publishDate 2008
record_format dspace
spelling mit-1721.1/437112019-04-12T09:57:48Z Modeling Computational Security in Long-Lived Systems, Version 2 Lynch, Nancy Pereira, Olivier Kaynar, Dilsun Cheung, Ling Canetti, Ran Nancy Lynch Theory of Computation For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., super-polynomial). In such cases, security cannot be guaranteed in the traditional sense: a computationally secure protocol may become insecure if the attacker has a super-polynomial number of interactions with the protocol. This paper proposes a new paradigm for the analysis of long-lived security protocols. We allow entities to be active for a potentially unbounded amount of real time, provided they perform only a polynomial amount of work per unit of real time. Moreover, the space used by these entities is allocated dynamically and must be polynomially bounded. We propose a new notion of long-term implementation, which is an adaptation of computational indistinguishability to the long-lived setting. We show that long-term implementation is preserved under polynomial parallel composition and exponential sequential composition. We illustrate the use of this new paradigm by analyzing some security properties of the long-lived timestamping protocol of Haber and Kamat. 2008-11-24T06:00:04Z 2008-11-24T06:00:04Z 2008-11-22 http://hdl.handle.net/1721.1/43711 MIT-CSAIL-TR-2008-068 27 p. application/pdf application/postscript
spellingShingle Lynch, Nancy
Pereira, Olivier
Kaynar, Dilsun
Cheung, Ling
Canetti, Ran
Modeling Computational Security in Long-Lived Systems, Version 2
title Modeling Computational Security in Long-Lived Systems, Version 2
title_full Modeling Computational Security in Long-Lived Systems, Version 2
title_fullStr Modeling Computational Security in Long-Lived Systems, Version 2
title_full_unstemmed Modeling Computational Security in Long-Lived Systems, Version 2
title_short Modeling Computational Security in Long-Lived Systems, Version 2
title_sort modeling computational security in long lived systems version 2
url http://hdl.handle.net/1721.1/43711
work_keys_str_mv AT lynchnancy modelingcomputationalsecurityinlonglivedsystemsversion2
AT pereiraolivier modelingcomputationalsecurityinlonglivedsystemsversion2
AT kaynardilsun modelingcomputationalsecurityinlonglivedsystemsversion2
AT cheungling modelingcomputationalsecurityinlonglivedsystemsversion2
AT canettiran modelingcomputationalsecurityinlonglivedsystemsversion2