• No results found

Information security as a resource

N/A
N/A
Protected

Academic year: 2021

Share "Information security as a resource"

Copied!
2
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

Information and Computation 226 (2013) 1–2

Contents lists available atSciVerse ScienceDirect

Information and Computation

www.elsevier.com/locate/yinco

Information Security as a Resource

The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford’s Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of exactly how the security (of cryptographic protocols, coin-tossing schemes and similar) can and should be modelled as a resource (akin to the computational resources—such as run-time and memory space—considered in complexity theory).

This special issue sets forth several perspectives on this question, some presented at the workshop, some offered by other invited authors.

In the first paper, Complexity-Style Resources in Cryptography, Blakey motivates the question of how to capture security as a resource. He recaps the way in which resources are utilized in complexity analyses of (both conventional and uncon-ventional) computations, and advocates analogous use of resource-like entities (relating not only to computation, but also to information, communication, etc.) in security analyses of cryptographic protocols, whence existing complexity-theoretic tools may be brought to bear in new contexts.

In Refereed Delegation of Computation, Canetti, Riva and Rothblum derive and assess protocols for computation’s secure delegation to untrusted servers. This assessment is made with respect to such measures as computational complexity (for both client and servers) and round complexity, thus encompassing diverse resources; the derivation is made (with detailed attention to practical implementation) with an eye on maintaining generality of the computations that can be so delegated, and on assuming little about the servers’ honesty.

In Signal-Flow-Based Analysis of Wireless Security Protocols, Çapar, Goeckel, Paterson, Quaglia, Towsley and Zafer apply ideas concerning signal flow so as to assess the communication costs (notably energy) incurred when executing protocols specifi-cally in a wireless context. They go on to present a key-exchange protocol advantageous with respect to such costs.

In Min-Entropy as a Resource, Espinoza and Smith take a resource-based approach to the study of secrecy, considering unintentional leakage of information (with min-entropy being the advocated measure) as consumption of the resource of useful secrecy. The rules of composition, relating secrecy consumption by a system to that by its constituent parts, are also explored.

In Thermodynamic Aspects of Confidentiality, Malacaria and Smeraldi adopt a thermodynamic, information-theoretic view of computation, using physical concepts so as to relate security, confidentiality and other resources.

Finally, in Monoidal Computer I: Basic Computability by String Diagrams, Pavlovic uses category theory (and the convenient formalization via string diagrams that this allows) to abstract from computation the high-level aspects relevant to a theory dealing with computational resources and cryptographic primitives, whilst discarding the irrelevant, low-level details arising from arbitrary details of implementation.

We thank the participants of Information Security as a Resource for their enlightening presentations and discussion, the authors who have contributed to this special issue of Information and Computation for their excellent papers, the referees of the contributions herein for diligently ensuring the high quality of the special issue, and the staff at Elsevier for their help in bringing this publication to press. We acknowledge the generous financial support of the EPSRC, which (via grant EP/G003017/1, ‘Complexity and Decidability in Unconventional Computational Models’) funded the workshop.

Ed Blakey∗ School of Mathematics, University of Bristol, UK E-mail address:ed.blakey@queens.oxon.org

*

Corresponding author.

0890-5401/$ – see front matter ©2013 Elsevier Inc. All rights reserved. http://dx.doi.org/10.1016/j.ic.2013.03.001

(2)

2 Information and Computation 226 (2013) 1–2

Bob Coecke Department of Computer Science, University of Oxford, UK E-mail address:bob.coecke@cs.ox.ac.uk Michael Mislove Department of Mathematics, Tulane University, USA E-mail address:michael.mislove@gmail.com Dusko Pavlovic Department of Computer Science, Royal Holloway, University of London, UK E-mail address:dusko.pavlovic@rhul.ac.uk 28 January 2013 Available online 7 March 2013

Referenties

GERELATEERDE DOCUMENTEN

A definition from a South African organisation, the Bench Marks Foundation (2003) is: “CSR involves a commitment to contribute to the economic, environmental and social

a generic FeCr producer with a production capacity of 300 000 t FeCr per annum is considered and it is assumed that 2.1 t of oxidative sintered pellets are consumed to produce 1

It is difficult to generalise this to the four cases discussed above, for nobody was, so far, really able to predict the concrete patterns of discontinua- tion in terms of point

Effects of cognitive remediation on cognitive dysfunction in partially or fully remitted patients with bipolar disorder: study protocol for a randomized controlled trial. 2013 Web of

This study aims to develop an unambiguous method to measure in real-time the activity of the JNK signaling pathway in Drosophila cells by evaluating the level of dJun phosphorylation

11 k. Die wyse waarop die opposisie dr. Verwoerd se invloed op die vorming van die Nasionale Party se op- vattinge in hierdie tyd aangevoel het, blyk onomwonde uit die

In de situatie waarbij ervan uitgegaan word dat van de gehele populatie vrouwen, 42% de wens heeft gevaccineerd te worden en tenminste de eerste dosis zal krijgen en wanneer er van

The main aim of this study was to investigate the knowledge women have about the Prevention of Mother To Child Transmission PMTCT whilst participating in the Mother To Mothers To