A Core Calculus for Equational Proofs of Cryptographic Protocols

被引:6
|
作者
Gancher, Joshua [1 ]
Sojakova, Kristina [2 ]
Fan, Xiong [3 ]
Shi, Elaine [1 ]
Morrisett, Greg [4 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] INRIA, Le Chesnay Rocquencourt, France
[3] Rutgers State Univ, Piscataway, NJ USA
[4] Cornell Univ, Ithaca, NY 14853 USA
来源
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL | 2023年 / 7卷 / POPL期
基金
美国国家科学基金会; 欧盟地平线“2020”;
关键词
cryptographic protocols; equational reasoning; observational equivalence; SECURITY;
D O I
10.1145/3571223
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol at hand to be observationally equivalent to an idealized specification. While pervasive, formal tool support for observational equivalence of cryptographic protocols is still a nascent area of research. Current mechanization efforts tend to either focus on diff-equivalence, which establishes observational equivalence between protocols with identical control structures, or require an explicit witness for the observational equivalence in the form of a bisimulation relation. Our goal is to simplify proofs for cryptographic protocols by introducing a core calculus, IPDL, for cryptographic observational equivalences. Via IPDL, we aim to address a number of theoretical issues for cryptographic proofs in a simple manner, including probabilistic behaviors, distributed message-passing, and resource-bounded adversaries and simulators. We demonstrate IPDL on a number of case studies, including a distributed coin toss protocol, Oblivious Transfer, and the GMW multi-party computation protocol. All proofs of case studies are mechanized via an embedding of IPDL into the Coq proof assistant.
引用
收藏
页码:866 / 892
页数:27
相关论文
共 50 条
  • [31] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
  • [32] Programming Language Techniques for Cryptographic Proofs
    Barthe, Gilles
    Gregoire, Benjamin
    Beguelin, Santiago Zanella
    INTERACTIVE THEOREM PROVING, PROCEEDINGS, 2010, 6172 : 115 - +
  • [33] Cryptography and cryptographic protocols
    Goldreich, O
    DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [34] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [35] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [36] Equational Reasoning About Quantum Protocols
    Gay, Simon J.
    Puthoor, Ittoop V.
    REVERSIBLE COMPUTATION, RC 2015, 2015, 9138 : 155 - 170
  • [37] Timed calculus of cryptographic communication
    Borgstoem, Johannes
    Grinchtein, Olga
    Kramer, Simon
    FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 16 - +
  • [38] A new graphical calculus of proofs
    Alves, Sandra
    Fernandez, Maribel
    Mackie, Ian
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2011, (48): : 69 - 84
  • [39] Socratic proofs for quantifiers (Calculus)
    Wisniewski, Andrzej
    Shangin, Vasilyi
    JOURNAL OF PHILOSOPHICAL LOGIC, 2006, 35 (02) : 147 - 178
  • [40] Discovery of equational replacement proofs using the congruence closure
    Brena, R
    PROCEEDINGS ISAI/IFIS 1996 - MEXICO - USA COLLABORATION IN INTELLIGENT SYSTEMS TECHNOLOGIES, 1996, : 356 - 361