A Core Calculus for Equational Proofs of Cryptographic Protocols

被引:6
|
作者
Gancher, Joshua [1 ]
Sojakova, Kristina [2 ]
Fan, Xiong [3 ]
Shi, Elaine [1 ]
Morrisett, Greg [4 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] INRIA, Le Chesnay Rocquencourt, France
[3] Rutgers State Univ, Piscataway, NJ USA
[4] Cornell Univ, Ithaca, NY 14853 USA
来源
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL | 2023年 / 7卷 / POPL期
基金
美国国家科学基金会; 欧盟地平线“2020”;
关键词
cryptographic protocols; equational reasoning; observational equivalence; SECURITY;
D O I
10.1145/3571223
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol at hand to be observationally equivalent to an idealized specification. While pervasive, formal tool support for observational equivalence of cryptographic protocols is still a nascent area of research. Current mechanization efforts tend to either focus on diff-equivalence, which establishes observational equivalence between protocols with identical control structures, or require an explicit witness for the observational equivalence in the form of a bisimulation relation. Our goal is to simplify proofs for cryptographic protocols by introducing a core calculus, IPDL, for cryptographic observational equivalences. Via IPDL, we aim to address a number of theoretical issues for cryptographic proofs in a simple manner, including probabilistic behaviors, distributed message-passing, and resource-bounded adversaries and simulators. We demonstrate IPDL on a number of case studies, including a distributed coin toss protocol, Oblivious Transfer, and the GMW multi-party computation protocol. All proofs of case studies are mechanized via an embedding of IPDL into the Coq proof assistant.
引用
收藏
页码:866 / 892
页数:27
相关论文
共 50 条
  • [41] A resolution calculus for shortening proofs
    Peltier, Nicolas
    LOGIC JOURNAL OF THE IGPL, 2005, 13 (03) : 307 - 333
  • [42] AN EQUATIONAL DEDUCTIVE SYSTEM FOR THE DIFFERENTIAL AND INTEGRAL CALCULUS
    CHUAQUI, R
    SUPPES, P
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 417 : 25 - 49
  • [43] Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
    Edris, Ed Kamya Kiyemba
    Aiash, Mahdi
    Khoshkholghi, Mohammad Ali
    Naha, Ranesh
    Chowdhury, Abdullahi
    Loo, Jonathan
    INTERNET OF THINGS, 2023, 24
  • [44] Short non-interactive cryptographic proofs
    Boyar, J
    Damgård, I
    Peralta, R
    JOURNAL OF CRYPTOLOGY, 2000, 13 (04) : 449 - 472
  • [45] Short Non-Interactive Cryptographic Proofs
    Joan Boyar
    Ivan Damgård
    René Peralta
    Journal of Cryptology, 2000, 13 : 449 - 472
  • [46] Sequential rationality in cryptographic protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    ACM Transactions on Economics and Computation, 2013, 1 (01)
  • [47] Special Issue on Cryptographic Protocols
    Vogt, Andreas
    CRYPTOGRAPHY, 2018, 2 (03)
  • [48] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
  • [49] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    PROVABLE SECURITY, 2011, 6980 : 2 - 2
  • [50] A rational approach to cryptographic protocols
    Caballero-Gil, P.
    Henandez-Goya, C.
    Bruno-Castaneda, C.
    MATHEMATICAL AND COMPUTER MODELLING, 2007, 46 (1-2) : 80 - 87