Monday, 30 August 2010

Recent Target (Reading two papers)

1. General Cryptographic Protocols: The Very Basics


2. Foundations of Cryptography - A Primer

Interesting quotations in this paper:

   1)  It is possible to build a cabin with no foundations, but not a lasting
       building.

       Eng. Isidor Goldreich (1906-1995) Who?

   2) Indistinguishable things are identical (or should be considered as identical).
    
      The Principle of Identity of Indiscernibles
    
      G.W. Leibniz (1646-1714)

   3) A proof is whatever convinces me.

      Shimon Even (1935-2004)

      http://en.wikipedia.org/wiki/Shimon_Even

   4) A good compromise is one in which the most important interests of all

      parties are satisfied.

     Adv. Klara Goldreich-Ingwer (1912-2004)
    

Both are the works of Oded Goldreich.


Notes on : General Cryptographic Protocols: The Very Basics

[24] R. Cleve. Limits on the security of Coin Flips when Half the Processors are Faulty. In STOC 1986

Provide a conclusion that:  there is no way to prevent a party from prematurely suspending the execution.

[hence] "in the case of two-party computation, secure computation is possible only if premature termination is not considered a breach of security"

[but in real applications, premature termination could compromise the security. How to deal with this? ]

"an alternative way of dealing with the problem of premature suspension of execution is to restrict our attention to single-output functionalities; that is, functionalities in which only one party is supposed to obtain an output." [as RFID?]

then "the definition of secure computation of such functionalities can be made identical to Definition 1, with the exception that no restriction is made on the set of dishonest parties (and in particular one may consider a single dishonest party in the case of two-party protocols.)” [in RFID, only reader could be dishonest? only tag?]  [what's definition 1's restriction on the two parties? ] [Details in "Foundations of cryptography" Sec. 7.2.3]

[Do the models mention in this paper deal with the inner state updating? Or RFID models? The latest one, Prof. Zhao's model]

[The role of reader and tag are not symmetric]

[concurrent consideration in RFID is meaningless?....Adversary can get information by interfereing with two roles? ]

[Cannot understand 4.1.1, 4.1.2]

No comments:

Post a Comment