User Tools

Site Tools

On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography (BibTeX)

  author      = {M.~Backes and M.~D{\"u}rmuth and R.~K{\"u}sters},
  title       = {{On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography}},
  booktitle   = {Proceedings of the 27th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2007)},
  year        = 2007,
  pages       = {108-120},
  publisher   = {Springer},
  series      = {Lecture Notes in Computer Science},
  volume      = 4855,
  abstract    = {The abstraction of cryptographic operations by term algebras, called Dolev-Yao models or symbolic cryptography, is essential in almost all tool-supported methods for proving security protocols. Recently significant progress was made -- using two conceptually different approaches -- in proving that Dolev-Yao models can be sound with respect to actual cryptographic realizations and security definitions. One such approach is grounded on the notion of simulatability, which constitutes a salient technique of Modern Cryptography with a longstanding history for a variety of different tasks.  The other approach strives for the so-called mapping soundness -- a more recent technique that is tailored to the soundness of specific security properties in Dolev-Yao models, and that can be established using more compact proofs. Typically, both notions of soundness for similar Dolev-Yao models are established separately in independent papers.  This paper relates the two approaches for the first time.  Our main result is that simulatability soundness entails mapping soundness provided that both approaches use the same cryptographic implementation.  Hence, future research may well concentrate on simulatability soundness whenever applicable, and resort to mapping soundness in those cases where simulatability soundness constitutes too strong a notion.}