Automated Proofs of Pairing-Based Cryptography

被引:18
|
作者
Barthe, Gilles [1 ]
Gregoire, Benjamin [2 ]
Schmidt, Benedikt [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] INRIA, Sophia Antipolis, France
关键词
automated proofs; provable security; public-key encryption; IDENTITY-BASED ENCRYPTION; SECURITY;
D O I
10.1145/2810103.2813697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Analyzing cryptographic constructions in the computational model, or simply verifying the correctness of security proofs, are complex and error-prone tasks. Although computer tools have significant potential to increase confidence in security proofs and to reduce the time for building these proofs, existing tools are either limited in scope, or can only be used by formal methods experts, and have a significant overhead. In effect, it has remained a challenge to design usable and intuitive tools for building and verifying cryptographic proofs, especially for more advanced fields such as pairing-based or lattice-based cryptography. This paper introduces a formal logic which captures some key reasoning principles in provable security, and more importantly, operates at a level of abstraction that closely matches cryptographic practice. Automatization of the logic is supported by an effective proof search procedure, which in turn embeds (extended and customized) techniques from automated reasoning, symbolic cryptography and program verification. Although the logic is general, some of the techniques for automating proofs are specific to fixed algebraic settings. Therefore, in order to illustrate the strengths of our logic, we implement a new tool, called Auto G&P, which supports extremely compact, and often fully automated, proofs of cryptographic constructions based on (bilinear or multilinear) Diffie-Hellman assumptions. For instance, we provide a 100-line proof of Waters' Dual System Encryption (CRYPTO'09), and fully automatic proofs of Boneh-Boyen Identity-Based Encryption (CRYPTO'04). Finally, we provide an automated tool that generates independently verifiable EasyCrypt proofs from AutoG&P proofs.
引用
收藏
页码:1156 / 1168
页数:13
相关论文
共 50 条
  • [41] Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three
    Granger, R
    Page, D
    Stam, M
    IEEE TRANSACTIONS ON COMPUTERS, 2005, 54 (07) : 852 - 860
  • [42] AMY: A SIMPLE AND SECURE WAY TO CONNECT DEVICES USING PAIRING-BASED CRYPTOGRAPHY
    Shin, Wook
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 359 - 360
  • [43] An Automated Scheduler-based Approach for the Development of Cryptoprocessors for Pairing-Based Cryptosystems
    Winograd, Theodore
    Shahid, Rabia
    Gaj, Kris
    2019 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2019, : 123 - 131
  • [44] On pairing-based cryptosystems
    Okamoto, Tatsuaki
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 50 - 66
  • [45] Towards the use of Pairing-Based Cryptography for Resource-Constrained Home Area Networks
    Jacobsen, Rune Hylsberg
    Mikkelsen, Soren Aagaard
    Rasmussen, Niels Holm
    2015 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2015, : 233 - 240
  • [46] PairVoting: A Secure Online Voting Scheme Using Pairing-Based Cryptography and Fuzzy Extractor
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    2015 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2015,
  • [47] Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography
    Li, Liang
    Hu, Gengran
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2023, 2024, 2004 : 77 - 91
  • [48] Pairing-based onion routing
    Kate, Aniket
    Zaverucha, Greg
    Goldberg, Ian
    PRIVACY ENHANCING TECHNOLOGIES, 2007, 4776 : 95 - +
  • [49] On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology, STUDENT 2012 - Conference Booklet, 2012, : 207 - 212
  • [50] On the Security of Pairing-Based Non-Interactive Designated Verifier Proofs of Undeniable Signature Schemes
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Gan, Che-Sheng
    2012 IEEE CONFERENCE ON SUSTAINABLE UTILIZATION AND DEVELOPMENT IN ENGINEERING AND TECHNOLOGY (STUDENT), 2012, : 207 - 212