Automatic verification of transparency protocols

被引:0
作者
Cheval, Vincent [1 ]
Moreira, Jose [2 ]
Ryan, Mark [3 ]
机构
[1] INRIA Paris, Paris, France
[2] Valory AG, Zug, Switzerland
[3] Univ Birmingham, Birmingham, W Midlands, England
来源
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P | 2023年
基金
英国工程与自然科学研究理事会;
关键词
protocols; transparency protocols; automatic verification; ProVerif; symbolic model; SECURITY PROTOCOLS;
D O I
10.1109/EuroSP57164.2023.00016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Transparency protocols are protocols whose actions can be publicly monitored by observers (such observers may include regulators, rights advocacy groups, or the general public). The observed actions are typically usages of private keys such as decryptions, and signings. Examples of transparency protocols include certificate transparency, cryptocurrency, transparent decryption, and electronic voting. These protocols usually pose a challenge for automatic verification, because they involve sophisticated data types that have strong properties, such as Merkle trees, that allow compact proofs of data presence and tree extension. We address this challenge by introducing new features in ProVerif, and a methodology for using them. With our methodology, it is possible to describe the data type quite abstractly, using ProVerif axioms, and prove the correctness of the protocol using those axioms as assumptions. Then, in separate steps, one can define one or more concrete implementations of the data type, and again use ProVerif to show that the implementations satisfy the assumptions that were coded as axioms. This helps make compositional proofs, splitting the proof burden into several manageable pieces. We illustrate the methodology and features by providing the first formal verification of the transparent decryption and certificate transparency protocols with a precise modelling of the Merkle tree data structure.
引用
收藏
页码:107 / 121
页数:15
相关论文
共 37 条
[1]   Deciding knowledge in security protocols under equational theories [J].
Abadi, Martin ;
Cortier, Veronique .
THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) :2-32
[2]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[3]   ARPKI: Attack Resilient Public-Key Infrastructure [J].
Basin, David ;
Cremers, Cas ;
Kim, Tiffany Hyun-Jin ;
Perrig, Adrian ;
Sasse, Ralf ;
Szalachowski, Pawel .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :382-393
[4]  
Bhargavan K., 2022, P 29 ACM C COMPUTER
[5]   Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate [J].
Bhargavan, Karthikeyan ;
Blanchet, Bruno ;
Kobeissi, Nadim .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :483-502
[6]  
Blanchet B., 2021, ProVerif 2.04: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
[7]  
Blanchet B, 2022, P IEEE S SECUR PRIV, P69, DOI [10.1109/SP46214.2022.00013, 10.1109/SP46214.2022.9833653]
[8]   Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols [J].
Blanchet, Bruno .
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, :68-82
[9]  
Blanchet B, 2016, Foundations and Trends® in Privacy and Security, V1, P1, DOI [10.1561/3300000004, DOI 10.1561/3300000004]
[10]   Automated Verification of Equivalence Properties of Cryptographic Protocols [J].
Chadha, Rohit ;
Cheval, Vincent ;
Ciobaca, Stefan ;
Kremer, Steve .
ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2016, 17 (04)