×

Formalisation of Bayesian concealment. (English) Zbl 1469.94117

Summary: In order to assure the concealment by cryptographic protocols, it is an effective measure to prove the concealment in a formal logical system. In the contemporary context of cryptographic protocol, the concealment has to be proved by using probability theory. There are several concepts of concealment in probability theory. One of them is Bayesian concealment. This study proposes a formal logical system to prove the Bayesian concealment of a secret sharing scheme.

MSC:

94A60 Cryptography
03F45 Provability logics and related algebras (e.g., diagonalizable algebras)
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Abadí, M.; Rogaway, P., Reconciling two views of cryptography (the computational soundness of formal encryption), J. Cryptol., 15, 103-127 (2002) · Zbl 0994.68066 · doi:10.1007/s00145-001-0014-7
[2] Affeldt, R.; Garrigue, J.; Saikawa, T., Reasoning with conditional probabilities and joint distributions in Coq, Comput. Softw., 37, 3, 79-95 (2020) · Zbl 1455.68254
[3] Boyle, E., Gilboa, N., Ishai, Y., Lin, H., Tessaro, S.: Foundations of homomorphic secret sharing. In: Karlin, A.R. (ed.) 9th Innovations in theoretical computer science conference (ITCS 2018), Leibniz international proceedings in informatics (LIPIcs), vol. 94, pp. 21:1-21:21. Schloss Dagstuhl-Leibniz-Zentrum fúr Informatik (2018) · Zbl 1462.94053
[4] Dougherty, D.J., Guttman, J.D.: An algebra for symbolic Diffie-Hellman protocol analysis. In: Palamidessi, C., Ryan, M. (eds.) Trustworthy global computing. TGC 2012. Lecture Notes in Computer Science, vol. 8191, pp. 164-181. Springer, Berlin (2012)
[5] Goldreich, O., Foundations of Cryptography (2008), Cambridge: Cambridge University Press, Cambridge · Zbl 1143.94300
[6] Heifetz, A.; Mongin, P., Probability logic for type spaces, Games Econ. Behav., 35, 31-53 (2001) · Zbl 0978.03017 · doi:10.1006/game.1999.0788
[7] O’Neill, KR; Halpern, JY, Secrecy in multiagent systems, ACM Trans. Inf. Syst. Secur., 12, 5, 1-47 (2003)
[8] Shamir, A., How to share a secret, Commun. ACM, 22, 11, 612-613 (1979) · Zbl 0414.94021 · doi:10.1145/359168.359176
[9] Takeuti, I.: Bayesian concealment. In: Adachi, T. (ed.) Algebraic System, Logic, Language and Related Areas in Computer Science II, RIMS Kôkyûroku. Kyoto University, Kyoto (2021, to appear)
[10] Takeuti, I.; Adachi, T., Formalisation of probabilistic concealment, Jpn. J. Ind. Appl. Math., 36, 2, 473-495 (2019) · Zbl 1418.94062 · doi:10.1007/s13160-019-00350-w
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.