Formal Verification of the Sumcheck Protocol

被引:0
作者
Bosshard, Azucena Garvia
Bootle, Jonathan [1 ]
Sprenger, Christoph [2 ]
机构
[1] IBM Res Europe, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Zurich, Switzerland
来源
2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024 | 2024年
关键词
sumcheck protocol; formal verification; interactive proofs; Isabelle; IP; PSPACE;
D O I
10.1109/CSF61375.2024.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sumcheck protocol, introduced in 1992, is an interactive proof which is a key component of many probabilistic proof systems in computational complexity theory and cryptography, some of which have been deployed. However, none of these proof systems based on the sumcheck protocol enjoy a formally-verified security analysis. In this paper, we make progress in this direction by providing a formally verified security analysis of the sumcheck protocol using the interactive theorem prover Isabelle/HOL. We follow a general and modular approach. First, we give a general formalization of public-coin interactive proofs. We then define a generalized sumcheck protocol for which we axiomatize the underlying mathematical structure and we establish its soundness and completeness. Finally, we prove that these axioms hold for multivariate polynomials, the original setting of the sumcheck protocol. Our modular analysis facilitates formal verification of sumcheck instances based on different mathematical structures with little effort, by simply proving that these structures satisfy the axioms. Moreover, the analysis supports the development and formal verification of future cryptographic protocols using the sumcheck protocol as a building block.
引用
收藏
页码:605 / 619
页数:15
相关论文
共 67 条
[1]   Subtractive Sets over Cyclotomic Rings Limits of Schnorr-Like Arguments over Lattices [J].
Albrecht, Martin R. ;
Lai, Russell W. F. .
ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 :519-548
[2]  
Almeida J. B., CCS 21
[3]  
Almeida J. B., 2023, Schnorr protocol in Jasmin
[4]  
[Anonymous], 2010, Archive of Formal Proofs
[5]  
Arora S, 2009, COMPUTATIONAL COMPLEXITY: A MODERN APPROACH, P1, DOI 10.1017/CBO9780511804090
[6]   Dew: A Transparent Constant-Sized Polynomial Commitment Scheme [J].
Arun, Arasu ;
Ganesh, Chaya ;
Lokam, Satya ;
Mopuri, Tushar ;
Sridhar, Sriram .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 :542-571
[7]   A Compressed Σ-Protocol Theory for Lattices [J].
Attema, Thomas ;
Cramer, Ronald ;
Kohl, Lisa .
ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 :549-579
[8]  
Babai Laszlo., 1985, Proceedings of the 17th Annual ACM Symposium on Theory of Computing, STOC'85, P421, DOI https://doi.org/10.1145/22145.22192
[9]   Another Look at Extraction and Randomization of Groth's zk-SNARK [J].
Baghery, Karim ;
Kohlweiss, Markulf ;
Siim, Janno ;
Volkhov, Mikhail .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 :457-475
[10]  
Bailey B., 2023, Report 2023/656