We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting subsets of adversaries in a modular, flexible fashion. We conclude by using string diagrams to rederive no-go results concerning the limits of bipartite and tripartite cryptography, ruling out e.g., composable commitments and broadcasting. On the way, we exhibit two categorical constructions of resource theories that might be of independent interest: one capturing resources shared among n parties and one capturing resource conversions that succeed asymptotically.
翻译:我们正式确定了分类理论方面的加密模拟范式,并表明,防止抽象攻击的议定书形成了一个对称的单向性分类,从而给加密中可作成的安全定义提供了一个抽象的模型。我们的模型能够包含计算安全性、设定假设和各种攻击模型,例如以模块化、灵活的方式串通或独立行动对手子集。我们通过使用字符串图来重新确定关于双方和三方加密的界限的不可动结果,排除了例如可作成的承诺和广播。在路上,我们展示了两种可能具有独立兴趣的资源理论的绝对结构:一种是捕捉n方共享的资源,另一种是捕捉在瞬间成功的资源转换。