A seminar by Eleanor McMurtry grad student at University of Melbourne on Metauni
Video URL
https://invidious.yoshixi.net/watch?v=BtBZek1wnWw&list=PLKnx70LRf21dtiDTaAqxsW2otBWkNqTm4&index=5
Notes
- Simulation Security used to motivate definition
- Simulator
- Use Cryptographic Machine that contain:
- Party (innocents)
- Adversary (Provoke bad behavior)
- Environment (Detect bad behavior)
- Use a Cryptographic Protocol which is an ensemble of machines
- Use a Cryptographic Execution - which is how the protocol works (semantics)
- Use a Cryptographic Emulation - ability to emulate a fancier protocol using a simple one (make a more secure system with weaker assumptions)
- A cryptosystem is secure if it can emulate a target’s execution
- Caller Machine
- Subroutine Machine
- Subsidiary Machine
- Cryptographic Protocol
- Cryptographic Execution