A Core Calculus for Equational Proofs of Cryptographic Protocols

被引:6
|
作者
Gancher, Joshua [1 ]
Sojakova, Kristina [2 ]
Fan, Xiong [3 ]
Shi, Elaine [1 ]
Morrisett, Greg [4 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] INRIA, Le Chesnay Rocquencourt, France
[3] Rutgers State Univ, Piscataway, NJ USA
[4] Cornell Univ, Ithaca, NY 14853 USA
基金
欧盟地平线“2020”; 美国国家科学基金会;
关键词
cryptographic protocols; equational reasoning; observational equivalence; SECURITY;
D O I
10.1145/3571223
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol at hand to be observationally equivalent to an idealized specification. While pervasive, formal tool support for observational equivalence of cryptographic protocols is still a nascent area of research. Current mechanization efforts tend to either focus on diff-equivalence, which establishes observational equivalence between protocols with identical control structures, or require an explicit witness for the observational equivalence in the form of a bisimulation relation. Our goal is to simplify proofs for cryptographic protocols by introducing a core calculus, IPDL, for cryptographic observational equivalences. Via IPDL, we aim to address a number of theoretical issues for cryptographic proofs in a simple manner, including probabilistic behaviors, distributed message-passing, and resource-bounded adversaries and simulators. We demonstrate IPDL on a number of case studies, including a distributed coin toss protocol, Oblivious Transfer, and the GMW multi-party computation protocol. All proofs of case studies are mechanized via an embedding of IPDL into the Coq proof assistant.
引用
收藏
页码:866 / 892
页数:27
相关论文
共 50 条
  • [1] A calculus for cryptographic protocols: The spi calculus
    Abadi, M
    Gordon, AD
    INFORMATION AND COMPUTATION, 1999, 148 (01) : 1 - 70
  • [2] Secrecy of cryptographic protocols under equational theory
    Houmani, H.
    Mejri, M.
    Fujita, H.
    KNOWLEDGE-BASED SYSTEMS, 2009, 22 (03) : 160 - 173
  • [3] Equational Security Proofs of Oblivious Transfer Protocols
    Li, Baiyu
    Micciancio, Daniele
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 527 - 553
  • [4] A calculus for cryptographic communication protocols - The CCP calculus
    Fang, Luming
    Wang, Hangjun
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1651 - +
  • [5] Studying Formal Security Proofs for Cryptographic Protocols
    Kogos, Konstantin G.
    Zapechnikov, Sergey, V
    INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 63 - 73
  • [6] Reasoning about cryptographic protocols in the spi calculus
    Abadi, M
    Gordon, AD
    CONCUR'97 : CONCURRENCY THEORY, 1997, 1243 : 59 - 73
  • [7] Game-Based Automated Security Proofs for Cryptographic Protocols
    Gu Chunxiang
    Guang Yan
    Zhu Yuefei
    CHINA COMMUNICATIONS, 2011, 8 (04) : 50 - 57
  • [8] Groupoid of equational proofs
    Kinoshita, Yoshiki
    Takahasi, Koichi
    Denshi Gijutsu Sogo Kenkyusho Iho/Bulletin of the Electrotechnical Laboratory, 1996, 60 (11): : 1 - 8
  • [9] Semi-automated verification of security proofs of quantum cryptographic protocols
    Kubota, Takahiro
    Kakutani, Yoshihiko
    Kato, Go
    Kawano, Yasuhito
    Sakurada, Hideki
    JOURNAL OF SYMBOLIC COMPUTATION, 2016, 73 : 192 - 220
  • [10] Formal proofs of cryptographic security of Diffie-Hellman-based protocols
    Roy, Arnab
    Datta, Anupam
    Mitchell, John C.
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 312 - +