Visible to the public Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model

TitleMechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Publication TypeConference Paper
Year of Publication2017
AuthorsStoughton, A., Varia, M.
Conference Name2017 IEEE 30th Computer Security Foundations Symposium (CSF)
ISBN Number978-1-5386-3217-8
Keywordsadaptive adversaries, Collaboration, Complexity theory, composability, concrete upper bounds, cryptographic protocols, cryptography, Databases, EASYCRYPT proof assistant, game parameters, game theory, Games, games approach sequence, honest-but-curious security, Human Behavior, human factor, information theoretic security, information-theoretic security, Metrics, multiparty cryptographic protocols, nonprogrammable random choices, oracle knowledge, party private count retrieval protocol, policy, Protocols, pubcrawl, random oracle model, real-ideal paradigm, Resiliency, Scalability, security of data, Servers, Upper bound
Abstract

We report on our research on proving the security of multi-party cryptographic protocols using the EASYCRYPT proof assistant. We work in the computational model using the sequence of games approach, and define honest-butcurious (semi-honest) security using a variation of the real/ideal paradigm in which, for each protocol party, an adversary chooses protocol inputs in an attempt to distinguish the party's real and ideal games. Our proofs are information-theoretic, instead of being based on complexity theory and computational assumptions. We employ oracles (e.g., random oracles for hashing) whose encapsulated states depend on dynamically-made, nonprogrammable random choices. By limiting an adversary's oracle use, one may obtain concrete upper bounds on the distances between a party's real and ideal games that are expressed in terms of game parameters. Furthermore, our proofs work for adaptive adversaries, ones that, when choosing the value of a protocol input, may condition this choice on their current protocol view and oracle knowledge. We provide an analysis in EASYCRYPT of a three party private count retrieval protocol. We emphasize the lessons learned from completing this proof.

URLhttps://ieeexplore.ieee.org/document/8049653
DOI10.1109/CSF.2017.36
Citation Keystoughton_mechanizing_2017