Automated Proofs of Pairing-Based Cryptography

被引:18
|
作者
Barthe, Gilles [1 ]
Gregoire, Benjamin [2 ]
Schmidt, Benedikt [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] INRIA, Sophia Antipolis, France
关键词
automated proofs; provable security; public-key encryption; IDENTITY-BASED ENCRYPTION; SECURITY;
D O I
10.1145/2810103.2813697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing cryptographic constructions in the computational model, or simply verifying the correctness of security proofs, are complex and error-prone tasks. Although computer tools have significant potential to increase confidence in security proofs and to reduce the time for building these proofs, existing tools are either limited in scope, or can only be used by formal methods experts, and have a significant overhead. In effect, it has remained a challenge to design usable and intuitive tools for building and verifying cryptographic proofs, especially for more advanced fields such as pairing-based or lattice-based cryptography. This paper introduces a formal logic which captures some key reasoning principles in provable security, and more importantly, operates at a level of abstraction that closely matches cryptographic practice. Automatization of the logic is supported by an effective proof search procedure, which in turn embeds (extended and customized) techniques from automated reasoning, symbolic cryptography and program verification. Although the logic is general, some of the techniques for automating proofs are specific to fixed algebraic settings. Therefore, in order to illustrate the strengths of our logic, we implement a new tool, called Auto G&P, which supports extremely compact, and often fully automated, proofs of cryptographic constructions based on (bilinear or multilinear) Diffie-Hellman assumptions. For instance, we provide a 100-line proof of Waters' Dual System Encryption (CRYPTO'09), and fully automatic proofs of Boneh-Boyen Identity-Based Encryption (CRYPTO'04). Finally, we provide an automated tool that generates independently verifiable EasyCrypt proofs from AutoG&P proofs.
引用
收藏
页码:1156 / 1168
页数:13
相关论文
共 50 条
  • [31] Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography
    Sakemi, Yumi
    Nogami, Yasuyuki
    Okeya, Katsuyuki
    Kato, Hidehiro
    Morikawa, Yoshitaka
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 226 - +
  • [32] An efficient implementation of pairing-based cryptography on MSP430 processor
    Jihoon Kwon
    Seog Chung Seo
    Seokhie Hong
    The Journal of Supercomputing, 2018, 74 : 1394 - 1417
  • [33] Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
    Benger, Naomi
    Scott, Michael
    ARITHMETIC OF FINITE FIELDS, PROCEEDINGS, 2010, 6087 : 180 - 195
  • [34] Improving side-channel attacks against pairing-based cryptography
    Jauvart, Damien
    El Mrabet, Nadia
    Fournier, Jacques J. A.
    Goubin, Louis
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (01) : 1 - 16
  • [35] Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
    Begum, Nasima
    Nakanishi, Toru
    Funabiki, Nobuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (12) : 2422 - 2433
  • [36] Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
    El Mrabet, Nadia
    Fouotsa, Emmanuel
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 259 - 273
  • [37] Establishing Authenticated Pairwise Key using Pairing-based Cryptography for Sensor Networks
    Yang, Lijun
    Ding, Chao
    Wu, Meng
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 517 - 522
  • [38] Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography
    Abe, Masayuki
    Hoshino, Fumitaka
    Ohkubo, Miyako
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1285 - 1292
  • [39] Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT
    Perazzo, Pericle
    Vallati, Carlo
    INTERNET OF THINGS, 2025, 30
  • [40] Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor
    Jihoon Kwon
    Seog Chung Seo
    Seokhie Hong
    The Journal of Supercomputing, 2018, 74 : 2254 - 2254