Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt

被引:0
|
作者
Hulsing, Andreas [1 ]
Meijers, Matthias [1 ]
Strub, Pierre-Yves [2 ]
机构
[1] Eindhoven Univ Technol, Eindhoven, Netherlands
[2] Meta, Paris, France
来源
基金
欧洲研究理事会;
关键词
Formal Verification; Saber; EasyCrypt; SECURITY;
D O I
10.1007/978-3-031-15802-5_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we consider the formal verification of the public-key encryption scheme of Saber, one of the selected few post-quantum cipher suites currently considered for potential standardization. We formally verify this public-key encryption scheme's IND-CPA security and 6-correctness properties, i.e., the properties required to transform the public-key encryption scheme into an IND-CCA2 secure and 6-correct key encapsulation mechanism, in EasyCrypt. To this end, we initially devise hand-written proofs for these properties that are significantly more detailed and meticulous than the presently existing proofs. Subsequently, these hand-written proofs serve as a guideline for the formal verification. The results of this endeavor comprise hand-written and computer-verified proofs which demonstrate that Saber's public-key encryption scheme indeed satisfies the desired security and correctness properties.
引用
收藏
页码:622 / 653
页数:32
相关论文
共 50 条
  • [31] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    [J]. 2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [32] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [33] Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
    Coron, JS
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 14 - 27
  • [34] Design and Implementation of a Lattice-Based Public-Key Encryption Scheme
    Lin, Hui
    Liu, Dongsheng
    Zhang, Cong
    Dong, Yahui
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (13)
  • [35] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227
  • [36] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [37] TFHE Public-Key Encryption Revisited
    Joye, Marc
    [J]. TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 277 - 291
  • [38] Public-Key Encryption with Lazy Parties
    Yasunaga, Kenji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) : 590 - 600
  • [39] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    [J]. CRYPTOGRAPHY, 2023, 7 (04)
  • [40] Incremental Deterministic Public-Key Encryption
    Mironov, Ilya
    Pandey, Omkant
    Reingold, Omer
    Segev, Gil
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 134 - 161