EPSRC Reference: |
EP/M029026/1 |
Title: |
Enhancing Security Through Improved Cryptographic Reductions |
Principal Investigator: |
Meiklejohn, Professor S |
Other Investigators: |
|
Researcher Co-Investigators: |
|
Project Partners: |
|
Department: |
Computer Science |
Organisation: |
UCL |
Scheme: |
First Grant - Revised 2009 |
Starts: |
30 October 2015 |
Ends: |
29 October 2017 |
Value (£): |
75,893
|
EPSRC Research Topic Classifications: |
Computer Sys. & Architecture |
Fundamentals of Computing |
|
EPSRC Industrial Sector Classifications: |
No relevance to Underpinning Sectors |
|
|
Related Grants: |
|
Panel History: |
Panel Date | Panel Name | Outcome |
14 Apr 2015
|
EPSRC ICT Prioritisation Panel - Apr 2015
|
Announced
|
|
Summary on Grant Application Form |
Most modern cryptographic constructions are accompanied by a proof of security, in which the difficulty of violating the security of the construction (e.g., distinguishing ciphertexts for an encryption scheme) is reduced to the difficulty of solving a certain algebraic problem. Cryptographic proofs of security - also called reductions - thus lie at the heart of provable security, yet writing and verifying cryptographic reductions is currently a time-intensive and manual process, with most reductions highly individualised for a specific primitive or algebraic setting. By identifying proof techniques common to many settings, the landscape of both reductions and the hardness assumptions that constructions rely on for security can be vastly simplified.
In a previous project, we demonstrated that certain proof techniques could also be applied outside of the settings for which they were originally intended, and moreover could be applied to show the equivalence of certain ad-hoc assumptions and more well-established assumptions. Thus, rather than avoid ad-hoc assumptions by providing new constructions or writing new reductions, we demonstrated that the security of a variety of existing constructions - which had relied previously on these ad-hoc assumptions for security - could now be considered secure under a milder assumption.
In this work, we will formalise techniques that are common across different proofs in a fashion that makes them easier to reuse, verify, and apply to new settings. This will not only make reductions easier to both write and understand, but also expand the applicability of useful proof techniques.
|
Key Findings |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Potential use in non-academic contexts |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Impacts |
Description |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk |
Summary |
|
Date Materialised |
|
|
Sectors submitted by the Researcher |
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
|
Project URL: |
|
Further Information: |
|
Organisation Website: |
|