Two views of cryptography and the gap in-between

dc.contributor.authorWu, Zehou
dc.contributor.supervisorKapron, Bruce
dc.contributor.supervisorLu, Yun
dc.date.accessioned2025-04-30T20:23:36Z
dc.date.available2025-04-30T20:23:36Z
dc.date.issued2025
dc.degree.departmentDepartment of Computer Science
dc.degree.levelMaster of Science MSc
dc.description.abstractThere are two popular views of cryptography. One is formal (symbolic), which uses expressions to model the ideal functionality of encryption functions and is easy to verify. The other is computational, which is what cryptographic assumptions rely on and is used for most security definitions. The challenge of reconciling these two views of cryptography lies in security under the presence of encryption cycles. In this thesis, we provide a proof of completeness for Abadi-Rogaway symbolic logic with respect to KDM security, a strong form of circular security. Further, we provide a larger set of expressions for which Micciancio's symbolic logic is complete with respect to CPA security, extending Micciancio's completeness, which holds only for the set of acyclic expressions. We also give an alternate characterization of Micciancio's logic. On the computational side, we give a proof that circular insecurity is maintained as cycle length decreases, which is not a previously shown result.
dc.description.scholarlevelGraduate
dc.identifier.urihttps://hdl.handle.net/1828/22060
dc.languageEnglisheng
dc.language.isoen
dc.rightsAvailable to the World Wide Web
dc.subjectSymbolic encryption
dc.subjectCircular security
dc.subjectCPA
dc.subjectKDM
dc.subjectSymmetric key
dc.subjectPublic key
dc.titleTwo views of cryptography and the gap in-between
dc.typeThesis

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Wu_Zehou_MSc_2025.pdf
Size:
493.02 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description: