A Fast and Verified Software Stack for Secure Function Evaluation

被引:19
|
作者
Almeida, Jose Bacelar [1 ,2 ]
Barbosa, Manuel [1 ,3 ]
Barthe, Gilles [4 ]
Dupressoir, Francois [5 ]
Gregoire, Benjamin [6 ]
Laporte, Vincent [4 ]
Pereira, Vitor [1 ,3 ]
机构
[1] INESC TEC, Porto, Portugal
[2] Univ Minho, Braga, Portugal
[3] Univ Porto, FCUP, Porto, Portugal
[4] IMDEA Software Inst, Madrid, Spain
[5] Univ Surrey, Guildford, Surrey, England
[6] Inria Sophia Antipolis, Biot, France
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
基金
英国工程与自然科学研究理事会;
关键词
Secure Function Evaluation; Verified Implementation; Certified Compilation;
D O I
10.1145/3133956.3134017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists of three components: i.a verified compiler (CircGen) that translates C programs into Boolean circuits; ii. a verified implementation of Yao's SFE protocol based on garbled circuits and oblivious transfer; and iii. transparent application integration and communications via FRESCO, an open-source framework for secure multiparty computation (MPC). CircGen is a general purpose tool that builds on CompCert, a verified optimizing compiler for C. It can be used in arbitrary Boolean circuit-based cryptography deployments. The security of our SFE protocol implementation is formally verified using EasyCrypt, a tool-assisted framework for building high-confidence cryptographic proofs, and it leverages a new formalization of garbled circuits based on the framework of Bellare, Hoang, and Rogaway (CCS 2012). We conduct a practical evaluation of our approach, and conclude that it is competitive with state-of-the-art (unverified) approaches. Our work provides concrete evidence of the feasibility of building efficient, verified, implementations of higher-level cryptographic systems. All our development is publicly available.
引用
收藏
页码:1989 / 2006
页数:18
相关论文
共 15 条
  • [1] Secure and Private Function Evaluation with Intel SGX
    Felsen, Susanne
    Kiss, Agnes
    Schneider, Thomas
    Weinert, Christian
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 165 - 181
  • [2] Rate-limited secure function evaluation
    Dagdelen, Oezguer
    Mohassel, Payman
    Venturi, Daniele
    THEORETICAL COMPUTER SCIENCE, 2016, 653 : 53 - 78
  • [3] A formal treatment of the role of verified compilers in secure computation
    Bacelar Almeida, Jose Carlos
    Barbosa, Manuel
    Barthe, Gilles
    Pacheco, Hugo
    Pereira, Vitor
    Portela, Bernardo
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 125
  • [4] On the Communication Complexity of Secure Function Evaluation with Long Output
    Hubacek, Pavel
    Wichs, Daniel
    PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15), 2015, : 163 - 172
  • [5] A Hybrid Approach to Secure Function Evaluation using SGX
    Choi, Joseph I.
    Tian, Dave
    Hernandez, Grant
    Patton, Christopher
    Mood, Benjamin
    Shrimpton, Thomas
    Butler, Kevin R. B.
    Traynor, Patrick
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 100 - 113
  • [6] Secure Function Evaluation Using an FPGA Overlay Architecture
    Fang, Xin
    Ioannidis, Stratis
    Leeser, Miriam
    FPGA'17: PROCEEDINGS OF THE 2017 ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE GATE ARRAYS, 2017, : 257 - 266
  • [7] Rate-Limited Secure Function Evaluation: Definitions and Constructions
    Dagdelen, Oezguer
    Mohassel, Payman
    Venturi, Daniele
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 461 - 478
  • [8] Statistical security conditions for two-party secure function evaluation
    Crepeau, Claude
    Wullschleger, Juerg
    INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 86 - +
  • [9] Mix and match: Secure function evaluation via ciphertexts - (Extended abstract)
    Jakobsson, M
    Juels, A
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 162 - 177
  • [10] For your phone only: custom protocols for efficient secure function evaluation on mobile devices
    Carter, Henry
    Amrutkar, Chaitrali
    Dacosta, Italo
    Traynor, Patrick
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (07) : 1165 - 1176