We introduce a framework for reasoning about this question. Our framework uses translators: special purpose oracles that map outputs of one cryptographic tool to corresponding outputs of a different tool. Translators are similar to, but generally weaker than, the ``angels'' of Prabhakaran and Sahai. We introduce the notion of substitution-friendly protocols and show that such protocols remain secure after substitution in our framework. We also leverage existing proofs of security; there is no need to re-prove security from scratch. We demonstrate our framework with a non-interactive non-malleable bit commitment protocol.
Category / Keywords: foundations / provable security, efficiency, translation, foundations Date: received 3 Jan 2006, last revised 23 Oct 2006 Contact author: leak at cs cmu edu Available formats: PDF | BibTeX Citation Note: We've added new examples and revised explanations for better clarity. Version: 20061023:130648 (All versions of this report) Discussion forum: Show discussion | Start new discussion