{"id":"https://openalex.org/W3152271084","doi":"https://doi.org/10.1145/3589962","title":"Mechanized Proofs of Adversarial Complexity and Application to Universal Composability","display_name":"Mechanized Proofs of Adversarial Complexity and Application to Universal Composability","publication_year":2023,"publication_date":"2023-03-31","ids":{"openalex":"https://openalex.org/W3152271084","doi":"https://doi.org/10.1145/3589962","mag":"3152271084"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3589962","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1145/3589962","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065970435","display_name":"Manuel Barbosa","orcid":"https://orcid.org/0000-0002-6848-5564"},"institutions":[{"id":"https://openalex.org/I4210166615","display_name":"INESC TEC","ror":"https://ror.org/05fa8ka61","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210125590","https://openalex.org/I4210166615"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Manuel Barbosa","raw_affiliation_strings":["CRACS & Inesc TEC [Porto] (4169-007 Porto - Portugal)"],"affiliations":[{"raw_affiliation_string":"CRACS & Inesc TEC [Porto] (4169-007 Porto - Portugal)","institution_ids":["https://openalex.org/I4210166615"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075577852","display_name":"Gilles Barthe","orcid":"https://orcid.org/0000-0002-3853-1777"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Gilles Barthe","raw_affiliation_strings":["MPI SP - Max Planck Institute for Security and Privacy [Bochum] (Germany)"],"affiliations":[{"raw_affiliation_string":"MPI SP - Max Planck Institute for Security and Privacy [Bochum] (Germany)","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103256238","display_name":"Benjamin Gr\u00e9goire","orcid":"https://orcid.org/0000-0001-6650-9924"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Benjamin Gr\u00e9goire","raw_affiliation_strings":["Inria & Universit\u00e9 C\u00f4te d\u2019Azur"],"affiliations":[{"raw_affiliation_string":"Inria & Universit\u00e9 C\u00f4te d\u2019Azur","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087028513","display_name":"Adrien Koutsos","orcid":"https://orcid.org/0000-0002-5891-154X"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Adrien Koutsos","raw_affiliation_strings":["Inria","PROSECCO - Programming securely with cryptography (48 Rue Barrault, 75013 Paris - France)"],"affiliations":[{"raw_affiliation_string":"PROSECCO - Programming securely with cryptography (48 Rue Barrault, 75013 Paris - France)","institution_ids":[]},{"raw_affiliation_string":"Inria","institution_ids":["https://openalex.org/I1326498283"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033447950","display_name":"Pierre-Yves Strub","orcid":"https://orcid.org/0000-0002-8196-7875"},"institutions":[],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pierre-Yves Strub","raw_affiliation_strings":["Meta (France)"],"affiliations":[{"raw_affiliation_string":"Meta (France)","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.352,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.606989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":85},"biblio":{"volume":"26","issue":"3","first_page":"1","last_page":"34"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/composability","display_name":"Composability","score":0.8153319}],"concepts":[{"id":"https://openalex.org/C2778814252","wikidata":"https://www.wikidata.org/wiki/Q5156715","display_name":"Composability","level":2,"score":0.8153319},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74764526},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.66748726},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.6507788},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.6179709},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.56911564},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.53288805},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5212753},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48914197},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.48544127},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.42574},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.41638872},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.32893583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2025002},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16757023},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15685666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12080318},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3589962","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://inria.hal.science/hal-04048217","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://inria.hal.science/hal-04048217/document","pdf_url":"https://inria.hal.science/hal-04048217/document","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.archives-ouvertes.fr/hal-03469015/file/eprint-main.pdf","pdf_url":"https://hal.archives-ouvertes.fr/hal-03469015/file/eprint-main.pdf","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.science/hal-03469015/file/eprint-main.pdf","pdf_url":"https://hal.science/hal-03469015/file/eprint-main.pdf","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.archives-ouvertes.fr/hal-03469015/document","pdf_url":"https://hal.archives-ouvertes.fr/hal-03469015/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hal.science/hal-03469015/document","pdf_url":"https://hal.science/hal-03469015/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":["Centre National de la Recherche Scientifique"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/3589962","pdf_url":null,"source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche","award_id":"TECAP ANR-17-CE39-0004-01"},{"funder":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research","award_id":"N00014-15-1-2750"}],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1458516385","https://openalex.org/W1499934958","https://openalex.org/W1536600995","https://openalex.org/W1595456961","https://openalex.org/W1700473745","https://openalex.org/W18814837","https://openalex.org/W1967175382","https://openalex.org/W2000108089","https://openalex.org/W2052267638","https://openalex.org/W2054122047","https://openalex.org/W2120647256","https://openalex.org/W2123991163","https://openalex.org/W2141670510","https://openalex.org/W2222812367","https://openalex.org/W2290798421","https://openalex.org/W2293472070","https://openalex.org/W2751465014","https://openalex.org/W2776364995","https://openalex.org/W2898492666","https://openalex.org/W2914676137","https://openalex.org/W2954632450","https://openalex.org/W2982615885","https://openalex.org/W2989424765","https://openalex.org/W3003637591","https://openalex.org/W3125330751","https://openalex.org/W3152271084","https://openalex.org/W3212833711","https://openalex.org/W4206109607","https://openalex.org/W4248755866","https://openalex.org/W4250678240"],"related_works":["https://openalex.org/W57958781","https://openalex.org/W4308361275","https://openalex.org/W3034338022","https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W2361781577","https://openalex.org/W2126560026","https://openalex.org/W1971522943","https://openalex.org/W1554274402","https://openalex.org/W1488313539"],"abstract_inverted_index":{"In":[0,112],"this":[1],"work,":[2],"we":[3,114,162],"enhance":[4],"the":[5,12,46,63,73,84,103],"EasyCrypt":[6,51,66,74,88],"proof":[7],"assistant":[8],"to":[9,138],"reason":[10],"about":[11,27],"computational":[13,28],"complexity":[14,29,122],"of":[15,35,45,65,105,159,166,176],"adversaries.":[16,54],"The":[17],"key":[18],"technical":[19],"tool":[20],"is":[21,41,60,149],"a":[22,121,152,156,173],"Hoare":[23,39],"logic":[24,40,59],"for":[25,52,72,144],"reasoning":[26],"(execution":[30],"time":[31,86],"and":[32,89,108,124,171],"oracle":[33],"calls)":[34],"adversarial":[36,106],"computations.":[37],"Our":[38],"built":[42],"on":[43],"top":[44],"module":[47,75],"system":[48],"used":[49],"by":[50],"modeling":[53],"We":[55,81],"prove":[56],"that":[57],"our":[58,96,160],"sound":[61],"w.r.t.":[62],"semantics":[64,71],"programs\u2014we":[67],"also":[68],"provide":[69],"full":[70],"system,":[76],"which":[77],"was":[78],"lacking":[79],"previously.":[80],"showcase":[82],"(for":[83],"first":[85],"in":[87,90,120,129,151],"other":[91],"computer-aided":[92],"cryptographic":[93,145,169],"tools)":[94],"how":[95],"approach":[97],"can":[98,115,135],"express":[99,125],"precise":[100],"relationships":[101],"between":[102],"probability":[104],"success":[107],"their":[109],"execution":[110],"time.":[111],"particular,":[113],"quantify":[116],"existentially":[117],"over":[118],"adversaries":[119],"class":[123],"general":[126],"composition":[127],"statements":[128,134],"simulation-based":[130],"frameworks.":[131],"Moreover,":[132],"such":[133],"be":[136],"composed":[137],"derive":[139],"standard":[140],"concrete":[141],"security":[142,148,164],"bounds":[143],"constructions":[146,170],"whose":[147],"proved":[150],"modular":[153],"way.":[154],"As":[155],"main":[157],"benefit":[158],"approach,":[161],"revisit":[163],"proofs":[165],"some":[167],"well-known":[168],"present":[172],"new":[174],"formalization":[175],"universal":[177],"composability.":[178]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3152271084","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2024-12-08T22:21:02.679406","created_date":"2021-04-13"}