INFORMATION SECURITY AS A RESOURCE
Thursday 13 – Saturday 15 October, 2011
Oxford University Department of Computer Science, Oxford, UK
There is a special issue (Information and Computation, vol. 226, pp. 1 – 116, May 2013) addressing the topic of this workshop (see ‘Scope’).
The guest editors of the issue are the four organizers of the workshop.
The traditional resources consumed during computational processes are time and space.
These suffice for complexity analyses of standard computers such as Turing machines, but are not exhaustive for certain non-standard (quantum, chemical, analogue, …) systems, which may for example consume energy or precision.
Non-standard resources arise naturally, then, in the context of unconventional computation; this is addressed in work relating to EPSRC grant EP/G003017/1 and by a previous workshop.
Non-standard resources arise also in the context of cryptography.
Specifically, it is desirable to model as a resource the notion of security of cryptographic protocols, for then security can be reasoned about with existing but previously inapplicable complexity-theoretic techniques.
Exactly how security can and should be modelled as a resource is the topic of this workshop.
The workshop brings together researchers with relevant interests, including but by no means limited to:
- cryptographic primitives;
- non-standard resources, especially as arising in cryptography/informatics; and
- category- and domain-theoretic techniques suitable for abstracting the relevant properties of security from the incidental details of protocols’ implementation.