Symmetric Encryption Schemes. #
This file defines a type SymmEncAlg spec M K C to represent a protocol
for symmetric encryption using oracles in spec, with message space M,
secret keys of type K, and ciphertext space C.
- spec : OracleSpec Q
- keygen (sp : ℕ) : OracleComp self.spec (K sp)
Instances For
Equations
Instances For
Equations
Instances For
Definitions and Equivalences #
perfectSecrecyAt is the canonical notion (independence form).
We also provide equivalent formulations:
perfectSecrecyPosteriorEqPriorAt(cross-multiplied posterior/prior form),perfectSecrecyJointFactorizationAt(same factorization with named marginals).
The _iff_ lemmas below record equivalence between these forms.
Joint message/ciphertext experiment used to express perfect secrecy.
Equations
Instances For
Ciphertext marginal induced by the perfect-secrecy experiment.
Equations
Instances For
Message prior induced by the message generator.
Equations
Instances For
Ciphertext experiment conditioned on a fixed message.
Equations
Instances For
Strong perfect secrecy at a fixed security parameter: ciphertexts are independent of messages for every prior distribution on messages (PMF-level quantification).
Equations
Instances For
Equivalent channel-style formulation: every message induces the same ciphertext distribution.
Equations
Instances For
Standard perfect secrecy at one security parameter, expressed as independence:
Pr[(M, C)] = Pr[M] * Pr[C]. This is the canonical code-level definition.
Equations
Instances For
Canonical asymptotic perfect secrecy notion.
Equations
Instances For
Posterior-equals-prior form, written in cross-multiplied form to avoid division.
This is equivalent to perfectSecrecyAt.
Equations
Instances For
Joint-factorization form (same mathematical statement as independence, with explicit
named priors/marginals). This is equivalent to perfectSecrecyAt.
Equations
Instances For
Equations
Instances For
Equations
Instances For
Core uniformity lemma: uniform keygen plus unique key per (message, ciphertext) pair
implies every (message, ciphertext) conditional has probability (card K)⁻¹.
Both Shannon theorems follow from this.
Constructive Shannon direction at fixed security parameter:
if keygen is uniform and each (message, ciphertext) pair is realized by a unique
key in support, then perfect secrecy holds (perfectSecrecyAt).
deterministicEnc asserts encryption is deterministic in distribution
(singleton support for each fixed (key, message)).
Note: the converse direction requires stronger prior expressivity assumptions than
perfectSecrecyAt currently encodes; see perfectSecrecyAtAllPriors.
Strong constructive Shannon direction with cardinality/completeness context: uniform keys plus uniqueness imply perfect secrecy for all priors.