Automated Proofs of Pairing-Based Cryptography

被引:18
|
作者
Barthe, Gilles [1 ]
Gregoire, Benjamin [2 ]
Schmidt, Benedikt [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] INRIA, Sophia Antipolis, France
关键词
automated proofs; provable security; public-key encryption; IDENTITY-BASED ENCRYPTION; SECURITY;
D O I
10.1145/2810103.2813697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing cryptographic constructions in the computational model, or simply verifying the correctness of security proofs, are complex and error-prone tasks. Although computer tools have significant potential to increase confidence in security proofs and to reduce the time for building these proofs, existing tools are either limited in scope, or can only be used by formal methods experts, and have a significant overhead. In effect, it has remained a challenge to design usable and intuitive tools for building and verifying cryptographic proofs, especially for more advanced fields such as pairing-based or lattice-based cryptography. This paper introduces a formal logic which captures some key reasoning principles in provable security, and more importantly, operates at a level of abstraction that closely matches cryptographic practice. Automatization of the logic is supported by an effective proof search procedure, which in turn embeds (extended and customized) techniques from automated reasoning, symbolic cryptography and program verification. Although the logic is general, some of the techniques for automating proofs are specific to fixed algebraic settings. Therefore, in order to illustrate the strengths of our logic, we implement a new tool, called Auto G&P, which supports extremely compact, and often fully automated, proofs of cryptographic constructions based on (bilinear or multilinear) Diffie-Hellman assumptions. For instance, we provide a 100-line proof of Waters' Dual System Encryption (CRYPTO'09), and fully automatic proofs of Boneh-Boyen Identity-Based Encryption (CRYPTO'04). Finally, we provide an automated tool that generates independently verifiable EasyCrypt proofs from AutoG&P proofs.
引用
收藏
页码:1156 / 1168
页数:13
相关论文
共 50 条
  • [21] Some Security Topics with Possible Applications for Pairing-Based Cryptography
    Tsudik, Gene
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 40 - 40
  • [22] Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers
    Andreica, Tudor
    Groza, Bogdan
    Murvay, Pal-Stefan
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 331 - 343
  • [23] Securing Information Exchange in VANETs by Using Pairing-Based Cryptography
    Chen, Chin-Ling
    Shin, Jungpil
    Tsai, Yu-Ting
    Castiglione, Aniello
    Palmieri, Francesco
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (06) : 781 - 797
  • [24] Pairing-Based Non-interactive Zero-Knowledge Proofs
    Groth, Jens
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 206 - 206
  • [25] Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
    Hajny, Jan
    Dzurenda, Petr
    Ricci, Sara
    Malina, Lukas
    Vrba, Kamil
    2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [26] An efficient implementation of pairing-based cryptography on MSP430 processor
    Kwon, Jihoon
    Seo, Seog Chung
    Hong, Seokhie
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03): : 1394 - 1417
  • [27] Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography
    Menezes, Alfred
    Sarkar, Palash
    Singh, Shashank
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 83 - 108
  • [28] Improving side-channel attacks against pairing-based cryptography
    Damien Jauvart
    Nadia El Mrabet
    Jacques J. A. Fournier
    Louis Goubin
    Journal of Cryptographic Engineering, 2020, 10 : 1 - 16
  • [29] On Constructing Prime Order Elliptic Curves Suitable for Pairing-Based Cryptography
    Zhang, Meng
    Chen, Xuehong
    Xu, Maozhi
    Wang, Jie
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 60 - 70
  • [30] The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
    Jager, Tibor
    Rupp, Andy
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 539 - +