Abstract.
Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views relies on a simple but effective formal approach; the other, on a detailed computational model that considers issues of complexity and probability. There is an uncomfortable and interesting gap between these two approaches to cryptography. This paper starts to bridge the gap, by providing a computational justification for a formal treatment of encryption.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
Author information
Authors and Affiliations
Additional information
Received July 2000 and revised January 2001 Online publication 19 October 2001
An erratum to this article is available at http://dx.doi.org/10.1007/s00145-007-0203-0.
Rights and permissions
About this article
Cite this article
Abadi, M., Rogaway, P. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)*. J. Cryptology 15, 103–127 (2002). https://doi.org/10.1007/s00145-001-0014-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00145-001-0014-7