Game-Based Automated Security Proofs for Cryptographic Protocols

被引:0
|
作者
Gu Chunxiang [1 ]
Guang Yan [1 ]
Zhu Yuefei [1 ]
机构
[1] Informat Engn Univ, Informat Engn Coll, Zhengzhou 450002, Henan Province, Peoples R China
关键词
cryptographic protocols; probable security; automatic security proof; process calculus;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Provable security has become a popular approach for analyzing the security of cryptographic protocols. However, writing and verifying proofs by hand are prone to errors. This paper advocates the automatic security proof framework with sequences of games. We make slight modifications to Blanchet's calculus to make it easy for parsing the initial game. The main contribution of this work is that it introduces algebraic properties with observational equivalences to automatic security proofs, and thus can deal with some practical cryptographic schemes with hard problems. We illustrate the use of algebraic properties in the framework by proving the semantic security of the ElGamal encryption scheme.
引用
收藏
页码:50 / 57
页数:8
相关论文
共 50 条
  • [1] A Calculus for Game-Based Security Proofs
    Nowak, David
    Zhang, Yu
    [J]. PROVABLE SECURITY, 2010, 6402 : 35 - +
  • [2] A framework for game-based security proofs
    Nowak, David
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 319 - 333
  • [3] Semi-automated verification of security proofs of quantum cryptographic protocols
    Kubota, Takahiro
    Kakutani, Yoshihiko
    Kato, Go
    Kawano, Yasuhito
    Sakurada, Hideki
    [J]. JOURNAL OF SYMBOLIC COMPUTATION, 2016, 73 : 192 - 220
  • [4] A Probabilistic Hoare-style logic for game-based cryptographic proofs
    Gorin, Ricardo
    den Hartog, Jerry
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 252 - 263
  • [5] Studying Formal Security Proofs for Cryptographic Protocols
    Kogos, Konstantin G.
    Zapechnikov, Sergey, V
    [J]. INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 63 - 73
  • [6] Game-Based Security Proofs for Secret Sharing Schemes
    Xia, Zhe
    Yang, Zhen
    Xiong, Shengwu
    Hsu, Ching-Fang
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 650 - 660
  • [7] Formal proofs of cryptographic security of Diffie-Hellman-based protocols
    Roy, Arnab
    Datta, Anupam
    Mitchell, John C.
    [J]. TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 312 - +
  • [8] Understanding Game-Based Privacy Proofs for Energy Consumption Aggregation Protocols
    Unterweger, Andreas
    Taheri-Boshrooyeh, Sanaz
    Eibl, Gunther
    Knirsch, Fabian
    Kupcu, Alptekin
    Engel, Dominik
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (05) : 5514 - 5523
  • [9] Computationally sound, automated proofs for security protocols
    Cortier, W
    Warinschi, B
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 157 - 171
  • [10] Game-based security proofs for verifiable secret sharing schemes in the standard model
    Mashhadi, Samaneh
    [J]. INFORMATION SECURITY JOURNAL, 2023, 32 (03): : 163 - 172