Computationally sound typing for non-interference: The case of deterministic encryption

12Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we present a type system to address deterministic encryption. The intuition that encrypting a secret yields a public value, that can be stored in a public variable, is faithful for probabilistic encryption but erroneous for deterministic encryption. We prove the computational soundness of our type system in the concrete security framework. © Springer-Vorlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Courant, J., Ene, C., & Lakhnech, Y. (2007). Computationally sound typing for non-interference: The case of deterministic encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4855 LNCS, pp. 364–375). Springer Verlag. https://doi.org/10.1007/978-3-540-77050-3_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free