Information and Computation 226 (2013) 1–2
Contents lists available atSciVerse ScienceDirect
Information and Computation
www.elsevier.com/locate/yinco
Information Security as a Resource
The three-day, international workshop Information Security as a Resource, held in October 2011 at the University of Oxford’s Department of Computer Science, brought together mathematical and computer-scientific researchers so as to shed light on the question of exactly how the security (of cryptographic protocols, coin-tossing schemes and similar) can and should be modelled as a resource (akin to the computational resources—such as run-time and memory space—considered in complexity theory).
This special issue sets forth several perspectives on this question, some presented at the workshop, some offered by other invited authors.
In the first paper, Complexity-Style Resources in Cryptography, Blakey motivates the question of how to capture security as a resource. He recaps the way in which resources are utilized in complexity analyses of (both conventional and uncon-ventional) computations, and advocates analogous use of resource-like entities (relating not only to computation, but also to information, communication, etc.) in security analyses of cryptographic protocols, whence existing complexity-theoretic tools may be brought to bear in new contexts.
In Refereed Delegation of Computation, Canetti, Riva and Rothblum derive and assess protocols for computation’s secure delegation to untrusted servers. This assessment is made with respect to such measures as computational complexity (for both client and servers) and round complexity, thus encompassing diverse resources; the derivation is made (with detailed attention to practical implementation) with an eye on maintaining generality of the computations that can be so delegated, and on assuming little about the servers’ honesty.
In Signal-Flow-Based Analysis of Wireless Security Protocols, Çapar, Goeckel, Paterson, Quaglia, Towsley and Zafer apply ideas concerning signal flow so as to assess the communication costs (notably energy) incurred when executing protocols specifi-cally in a wireless context. They go on to present a key-exchange protocol advantageous with respect to such costs.
In Min-Entropy as a Resource, Espinoza and Smith take a resource-based approach to the study of secrecy, considering unintentional leakage of information (with min-entropy being the advocated measure) as consumption of the resource of useful secrecy. The rules of composition, relating secrecy consumption by a system to that by its constituent parts, are also explored.
In Thermodynamic Aspects of Confidentiality, Malacaria and Smeraldi adopt a thermodynamic, information-theoretic view of computation, using physical concepts so as to relate security, confidentiality and other resources.
Finally, in Monoidal Computer I: Basic Computability by String Diagrams, Pavlovic uses category theory (and the convenient formalization via string diagrams that this allows) to abstract from computation the high-level aspects relevant to a theory dealing with computational resources and cryptographic primitives, whilst discarding the irrelevant, low-level details arising from arbitrary details of implementation.
We thank the participants of Information Security as a Resource for their enlightening presentations and discussion, the authors who have contributed to this special issue of Information and Computation for their excellent papers, the referees of the contributions herein for diligently ensuring the high quality of the special issue, and the staff at Elsevier for their help in bringing this publication to press. We acknowledge the generous financial support of the EPSRC, which (via grant EP/G003017/1, ‘Complexity and Decidability in Unconventional Computational Models’) funded the workshop.
Ed Blakey∗ School of Mathematics, University of Bristol, UK E-mail address:ed.blakey@queens.oxon.org
*
Corresponding author.0890-5401/$ – see front matter ©2013 Elsevier Inc. All rights reserved. http://dx.doi.org/10.1016/j.ic.2013.03.001
2 Information and Computation 226 (2013) 1–2
Bob Coecke Department of Computer Science, University of Oxford, UK E-mail address:bob.coecke@cs.ox.ac.uk Michael Mislove Department of Mathematics, Tulane University, USA E-mail address:michael.mislove@gmail.com Dusko Pavlovic Department of Computer Science, Royal Holloway, University of London, UK E-mail address:dusko.pavlovic@rhul.ac.uk 28 January 2013 Available online 7 March 2013