Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt

被引:0
|
作者
Hulsing, Andreas [1 ]
Meijers, Matthias [1 ]
Strub, Pierre-Yves [2 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
[2] Meta, Paris, France
来源
基金
欧洲研究理事会;
关键词
Formal Verification; Saber; EasyCrypt; SECURITY;
D O I
10.1007/978-3-031-15802-5_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we consider the formal verification of the public-key encryption scheme of Saber, one of the selected few post-quantum cipher suites currently considered for potential standardization. We formally verify this public-key encryption scheme's IND-CPA security and 6-correctness properties, i.e., the properties required to transform the public-key encryption scheme into an IND-CCA2 secure and 6-correct key encapsulation mechanism, in EasyCrypt. To this end, we initially devise hand-written proofs for these properties that are significantly more detailed and meticulous than the presently existing proofs. Subsequently, these hand-written proofs serve as a guideline for the formal verification. The results of this endeavor comprise hand-written and computer-verified proofs which demonstrate that Saber's public-key encryption scheme indeed satisfies the desired security and correctness properties.
引用
收藏
页码:622 / 653
页数:32
相关论文
共 50 条
  • [1] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    [J]. Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [2] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102
  • [3] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [4] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [5] AN M3 PUBLIC-KEY ENCRYPTION SCHEME
    WILLIAMS, HC
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 358 - 368
  • [6] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [7] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [8] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    [J]. Journal of Cryptology, 2007, 20 : 265 - 294
  • [9] ON THE CONCEALABILITY OF MESSAGES BY THE WILLIAMS PUBLIC-KEY ENCRYPTION SCHEME
    KOTHARI, S
    LAKSHMIVARAHAN, S
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1984, 10 (01) : 15 - 24
  • [10] Combining Public-Key Encryption with Digital Signature Scheme
    Alia, Mohammad Ahmad
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 : 870 - 878