Machine-checked security proofs of cryptographic signature schemes

被引:0
|
作者
Tarento, S [1 ]
机构
[1] INRIA, Sophia Antipolis, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e. the hypothesis that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. A model that does not require the perfect cryptography assumption is the generic model and the random oracle model. These models provide non-standard computational models in which one may reason about the computational cost of breaking a cryptographic scheme. Using the machine-checked account of the Generic Model and the Random Oracle Model formalized in Coq, we prove the safety of cryptosystems that depend on a cyclic group (like ElGamal cryptosystem), against interactive generic attacks and we prove the security of blind signatures against interactive attacks. To prove the last step, we use a generic parallel attack to create a forgery signature.
引用
收藏
页码:140 / 158
页数:19
相关论文
共 50 条
  • [1] Efficient construction of machine-checked symbolic protocol security proofs
    Meier, Simon
    Cremers, Cas
    Basin, David
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (01) : 41 - 87
  • [2] Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs
    Meier, Simon
    Cremers, Cas
    Basin, David
    2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 231 - 245
  • [3] Machine-Checked Proofs for Realizability Checking Algorithms
    Katis, Andreas
    Gacek, Andrew
    Whalen, Michael W.
    VERIFIED SOFTWARE: THEORIES, TOOLS, AND EXPERIMENTS, 2016, 9593 : 110 - 123
  • [4] Machine-Checked Proofs of Privacy for Electronic Voting Protocols
    Cortier, Veronique
    Dragan, Constantin Catalin
    Dupressoir, Francois
    Schmidt, Benedikt
    Strub, Pierre-Yves
    Warinschi, Bogdan
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 993 - 1008
  • [5] Automated Machine-Checked Hybrid System Safety Proofs
    Geuvers, Herman
    Koprowski, Adam
    Synek, Dan
    van der Weegen, Eelis
    INTERACTIVE THEOREM PROVING, PROCEEDINGS, 2010, 6172 : 259 - +
  • [6] Machine-checked proofs for electronic voting: privacy and verifiability for Belenios
    Cortier, Veronique
    Dragan, Constantin Catalin
    Dupressoir, Francois
    Warinschi, Bogdan
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 298 - 312
  • [7] Machine-Checked Proofs of Accountability: How to sElect Who is to Blame
    Dragan, Constantin Catalin
    Dupressoir, Francois
    Gjosteen, Kristian
    Haines, Thomas
    Ronne, Peter B.
    Solberg, Morten Rotvold
    COMPUTER SECURITY - ESORICS 2023, PT III, 2024, 14346 : 471 - 491
  • [8] A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flow
    Amtoft, Torben
    Dodds, Josiah
    Zhang, Zhi
    Appel, Andrew
    Beringer, Lennart
    Hatcliff, John
    Ou, Xinming
    Cousino, Andrew
    PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 369 - 389
  • [9] Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Correia, Manuel L.
    Eldefrawy, Karim
    Graham-Lengrand, Stephane
    Pacheco, Hugo
    Pereira, Vitor
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2587 - 2600
  • [10] Machine-checked proofs of privacy against malicious boards for Selene & Co
    Dragan, Constantin Catalin
    Dupressoir, Francois
    Estaji, Ehsan
    Gjosteen, Kristian
    HAines, Thomas
    Ryan, Peter Y. A.
    Ronne, Peter B.
    Solberg, Morten Rotvold
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (05) : 469 - 499