Computational observation layer for UC security #
This file bridges the abstract UC judgments (Emulates, UCSecure) to
concrete computational indistinguishability by instantiating the ObsEq
parameter with distributional advantage bounds.
Main definitions #
Semantics Tis a function extracting aProbComp Unitgame from each closed system in the theoryT. This is the minimal bridge between the structural open-composition layer and the probabilistic crypto layer.CompEmulates sem ε real idealasserts that for every environment (plug), the distinguishing advantage between the real and ideal closed systems is at mostε.AsympCompEmulatesis the asymptotic variant: for every PPT adversary choosing environments, the advantage is negligible in the security parameter.CompUCSecure sem ε protocol ideal SimSpace simulateis the simulator-based variant with bounded advantage.
Main results #
CompEmulates.refl: advantage zero against itself.CompEmulates.triangle: transitivity with additive advantage bounds.CompEmulates.map_invariance: boundary adaptation preserves the bound.CompEmulates.par_compose,wire_compose,plug_compose: advantages add under parallel, wired, and plugged composition.CompEmulates.toEmulates: everyCompEmulatesyields an abstractEmulatesfor the induced observation relation.CompUCSecure.toCompEmulates: simulator-based security implies computational emulation when the simulator is the identity.AsympCompEmulates.par_compose,wire_compose,plug_compose: asymptotic composition from pointwise negligible bounds.ucDistGame: constructs theSecurityGamewhose advantage is the UC distinguishing advantage.AsympCompEmulates.iff_secureAgainst:AsympCompEmulatesis equivalent to security of the UC distinguishing game.
Semantics T extracts a probabilistic game (ProbComp Unit) from each
closed system in the open-composition theory T.
The Unit return type matches the convention used by
ProbComp.distAdvantage: success is () and failure is ⊥.
This is the minimal bridge needed to give computational meaning to the
abstract Emulates judgment.
Instances For
CompEmulates sem ε real ideal asserts that real computationally
emulates ideal up to advantage ε under semantics sem.
For every plug K : T.Plug Δ, the distinguishing advantage between the
real-world and ideal-world closed executions is at most ε.
Instances For
The observation relation on closed systems induced by a semantics and
an advantage bound: two closed systems are related when their
distinguishing advantage is at most ε.
Instances For
CompEmulates is an instance of abstract Emulates for the observation
relation compObsEq sem ε.
Every system computationally emulates itself with advantage zero.
Computational emulation composes transitively with additive advantage bounds (triangle inequality on distinguishing advantage).
Adapting both sides of a computational emulation along the same boundary morphism preserves the advantage bound.
This is the computational specialization of Emulates.map_invariance.
The key identity is plug (map f W) K = plug W (map (swap f) K).
Weakening: if ε₁ ≤ ε₂ then CompEmulates sem ε₁ implies
CompEmulates sem ε₂.
Composition #
Replacing the left component of a parallel composition preserves the computational emulation bound.
Replacing the right component of a parallel composition preserves the computational emulation bound.
Computational UC composition for par: advantages add.
Replacing the left factor of a wiring preserves the computational emulation bound.
Replacing the right factor of a wiring preserves the computational emulation bound.
Computational UC composition for wire: advantages add.
Computational UC composition for plug: when both the protocol
and the environment emulate their ideals, the advantage of the closed
real system vs. closed ideal system is bounded by the sum.
Simulator-based computational UC security #
CompUCSecure sem ε protocol ideal SimSpace simulate is the
simulator-based UC security statement with bounded advantage.
There exists a simulator parameter s : SimSpace such that for every
context K, the distinguishing advantage between the real execution
and the simulated ideal execution is at most ε.
Instances For
Computational emulation implies simulator-based UC security with the trivial (identity) simulator.
Simulator-based UC security with identity simulation recovers computational emulation.
Asymptotic computational emulation #
AsympCompEmulates is the asymptotic version of computational emulation.
Given a family of theories T n indexed by security parameter n : ℕ,
with corresponding semantics, real/ideal systems, and adversary-chosen
environments, this asserts that every PPT adversary has negligible
distinguishing advantage.
Instances For
Pointwise bounded advantage implies asymptotic security: if at each
security parameter the advantage is bounded by f n, and f is
negligible, then the asymptotic emulation holds (for any adversary class).
Convert a family of pointwise CompEmulates bounds into an asymptotic
statement when the bound function is negligible.
Asymptotic composition #
Asymptotic UC composition for par: if each component's pointwise
advantage is negligible, then the parallel composition also has negligible
advantage.
Asymptotic UC composition for wire: if each factor's pointwise
advantage is negligible, then the wired composition also has negligible
advantage.
Asymptotic UC composition for plug: if both the protocol and
the environment have negligible pointwise advantages, then the
distinguishing advantage of the closed real vs. closed ideal system
is negligible.
Bridge to SecurityGame #
The UC distinguishing game: a SecurityGame whose advantage at adversary
A and security parameter n is the distributional distance between the
real and ideal closed executions under the environment chosen by A.
Instances For
AsympCompEmulates is exactly secureAgainst isPPT for the UC
distinguishing game. This is definitional.
If real UC-emulates ideal, then the UC distinguishing game is secure against
any adversary class. Uses the SecurityGame.secureAgainst vocabulary.
UC security reduction: if security of g₁ reduces to UC-emulation of
real by ideal, then g₁ is secure whenever UC-emulation holds.
This bridges SecurityGame.secureAgainst_of_reduction to the UC setting:
given a reduction from a standard security game to the UC distinguishing
game, UC-emulation implies security of the original game.