Sommaire

  • Cet exposé a été présenté le 27 janvier 2006.

Description

  • Orateur

    Véronique Cortier - LORIA

Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes. Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs. However, the guarantees that it offers have been quite unclear.<br/> We present two results that show soundness of formal models with respect to computational notions of security.<br/> First, we establish that symbolic integrity and secrecy proofs are sound with respect to the computational model in the case of protocols that use signatures and asymmetric encryption. This is a join work with Bogdan Warinschi. Secondly, we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary, for abitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization w.r.t. various security notions. In particular, we concentrate on the computationnal soundness of static equivalence, a standard tool in cryptographic $\pi$-calculi. This is a join work with Mathieu Baudet and Steve Kremer.

Prochains exposés

  • Efficient zero-knowledge proofs and arguments in the CL framework

    • 07 mars 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Agathe Beaugrand - Institut de Mathématiques de Bordeaux

    The CL encryption scheme, proposed in 2015 by Castagnos and Laguillaumie, is a linearly homomorphic encryption scheme, based on class groups of imaginary quadratic fields. The specificity of these groups is that their order is hard to compute, which means it can be considered unknown. This particularity, while being key in the security of the scheme, brings technical challenges in working with CL,[…]
  • Constant-time lattice reduction for SQIsign

    • 14 mars 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Sina Schaeffler - IBM Research

    SQIsign is an isogeny-based signature scheme which has recently advanced to round 2 of NIST's call for additional post-quantum signatures. A central operation in SQIsign is lattice reduction of special full-rank lattices in dimension 4. As these input lattices are secret, this computation must be protected against side-channel attacks. However, known lattice reduction algorithms like the famous[…]
  • Circuit optimisation problems in the context of homomorphic encryption

    • 21 mars 2025 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Orateur : Sergiu Carpov - Arcium

    Fully homomorphic encryption (FHE) is an encryption scheme that enables the direct execution of arbitrary computations on encrypted data. The first generation of FHE schemes began with Gentry's groundbreaking work in 2019. It relies on a technique called bootstrapping, which reduces noise in FHE ciphertexts. This construction theoretically enables the execution of any arithmetic circuit, but[…]
  • Cycles of pairing-friendly abelian varieties

    • 28 mars 2025 (13:45 - 14:45)

    • Salle Guernesey, ISTIC

    Orateur : Maria Corte-Real Santos - ENS Lyon

    A promising avenue for realising scalable proof systems relies on the existence of 2-cycles of pairing-friendly elliptic curves. More specifically, such a cycle consists of two elliptic curves E/Fp and E’/Fq that both have a low embedding degree and also satisfy q = #E(Fp) and p = #E’(Fq). These constraints turn out to be rather restrictive; in the decade that has passed since 2-cycles were first[…]
    • Cryptography

  • Journées C2

    • 04 avril 2025 (00:00 - 18:00)

    • Pornichet

Voir les exposés passés