Card-Based Cryptography Meets Formal Verification

被引:15
|
作者
Koch, Alexander [1 ]
Schrempp, Michael [1 ]
Kirsten, Michael [1 ]
机构
[1] Karlsruhe Inst Technol KIT, Karlsruhe, Germany
关键词
Secure multiparty computation; Card-based cryptography; Formal verification; Bounded model checking; Standard decks; Two-color decks; PROTOCOLS;
D O I
10.1007/s00354-020-00120-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation with just a deck of cards. For the sake of simplicity, this is often done using cards with only two symbols, e.g.,. and.. Within this paper, we also target the setting where all cards carry distinct symbols, catering for use-cases with commonly available standard decks and aweaker indistinguishability assumption. As of yet, the literature provides for only three protocols and no proofs for non-trivial lower bounds on the number of cards. As such complex proofs (handling very large combinatorial state spaces) tend to be involved and error-prone, we propose using formal verification for finding protocols and proving lower bounds. In this paper, we employ the technique of software bounded model checking (SBMC), which reduces the problem to a bounded state space, which is automatically searched exhaustively using a SAT solver as a backend. Our contribution is threefold: (a) we identify two protocols for converting between different bit encodings with overlapping bases, and then show them to be card-minimal. This completes the picture of tight lower bounds on the number of cards with respect to runtime behavior and shuffle properties of conversion protocols. For computing AND, we show that there is no protocol with finite runtime using four cards with distinguishable symbols and fixed output encoding, and give a four-card protocol with an expected finite runtime using only random cuts. (b) We provide a general translation of proofs for lower bounds to a bounded model checking framework for automatically finding card- and run-minimal (i.e., the protocol has a run of minimal length) protocols and to give additional confidence in lower bounds. We apply this to validate our method and, as an example, confirm our new AND protocol to have its shortest run for protocols using this number of cards. (c) We extend our method to also handle the case of decks on symbols. and., where we show run-minimality for two AND protocols from the literature.
引用
收藏
页码:115 / 158
页数:44
相关论文
共 50 条
  • [31] AN ENVIRONMENT FOR FORMAL VERIFICATION BASED ON SYMBOLIC COMPUTATIONS
    HOJATI, R
    BRAYTON, RK
    FORMAL METHODS IN SYSTEM DESIGN, 1995, 6 (02) : 191 - 216
  • [32] Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations
    Kuzuma, Tomoki
    Isuzugawa, Raimu
    Toyoda, Kodai
    Miyahara, Daiki
    Mizuki, Takaaki
    APKC'22: PROCEEDINGS OF THE 9TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2022, : 51 - 58
  • [33] Towards formal verification of ASIP based on HDPN
    Gao, Yanyan
    Li, Xi
    Ma, Hongxing
    ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 26 - 32
  • [34] Formal Verification
    Meenakshi, B.
    RESONANCE-JOURNAL OF SCIENCE EDUCATION, 2005, 10 (05): : 26 - 38
  • [35] Formal verification of component-based designs
    Daniel Karlsson
    Petru Eles
    Zebo Peng
    Design Automation for Embedded Systems, 2007, 11 : 49 - 90
  • [36] ASIC Verification: Integrating Formal Verification With HDL-Based Courses
    Massoumi, Mehran
    Sagahyroon, Assim
    COMPUTER APPLICATIONS IN ENGINEERING EDUCATION, 2010, 18 (02) : 269 - 276
  • [37] Formal verification
    B Meenakshi
    Resonance, 2005, 10 (5) : 26 - 38
  • [38] THE FORMAL STUDY OF QUANTUM CRYPTOGRAPHY PROTOCOLS
    Yang, Fan
    Hao, Yu-Jie
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 29 - 33
  • [39] Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem
    Tamura, Yuma
    Suzuki, Akira
    Mizuki, Takaaki
    PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, : 11 - 22
  • [40] Formal Verification Issues For Component-Based Development
    Hariati, Mehdi
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2020, 44 (04): : 469 - 475