Security

Simulation-Based Security With Inexhaustible Interactive Turing Machines

Free registration required

Executive Summary

Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Finding such extensions has turned out to be a non-trivial task. In this work, the authors propose a simple, yet expressive general computational model for systems of Interactive Turing Machines (ITMs) where the runtime of the ITMs may be polynomial per activation and may depend on the length of the input received. One distinguishing feature of the model is that the systems of ITMs that they consider involve a generic mechanism for addressing dynamically generated copies of ITMs.

  • Format: PDF
  • Size: 266.9 KB