Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Title | Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Stoughton, A., Varia, M. |
Conference Name | 2017 IEEE 30th Computer Security Foundations Symposium (CSF) |
ISBN Number | 978-1-5386-3217-8 |
Keywords | adaptive adversaries, Collaboration, Complexity theory, composability, concrete upper bounds, cryptographic protocols, cryptography, Databases, EASYCRYPT proof assistant, game parameters, game theory, Games, games approach sequence, honest-but-curious security, Human Behavior, human factor, information theoretic security, information-theoretic security, Metrics, multiparty cryptographic protocols, nonprogrammable random choices, oracle knowledge, party private count retrieval protocol, policy, Protocols, pubcrawl, random oracle model, real-ideal paradigm, Resiliency, Scalability, security of data, Servers, Upper bound |
Abstract | We report on our research on proving the security of multi-party cryptographic protocols using the EASYCRYPT proof assistant. We work in the computational model using the sequence of games approach, and define honest-butcurious (semi-honest) security using a variation of the real/ideal paradigm in which, for each protocol party, an adversary chooses protocol inputs in an attempt to distinguish the party's real and ideal games. Our proofs are information-theoretic, instead of being based on complexity theory and computational assumptions. We employ oracles (e.g., random oracles for hashing) whose encapsulated states depend on dynamically-made, nonprogrammable random choices. By limiting an adversary's oracle use, one may obtain concrete upper bounds on the distances between a party's real and ideal games that are expressed in terms of game parameters. Furthermore, our proofs work for adaptive adversaries, ones that, when choosing the value of a protocol input, may condition this choice on their current protocol view and oracle knowledge. We provide an analysis in EASYCRYPT of a three party private count retrieval protocol. We emphasize the lessons learned from completing this proof. |
URL | https://ieeexplore.ieee.org/document/8049653 |
DOI | 10.1109/CSF.2017.36 |
Citation Key | stoughton_mechanizing_2017 |
- pubcrawl
- information-theoretic security
- Metrics
- multiparty cryptographic protocols
- nonprogrammable random choices
- oracle knowledge
- party private count retrieval protocol
- Policy
- Protocols
- information theoretic security
- random oracle model
- real-ideal paradigm
- Resiliency
- Scalability
- security of data
- Servers
- Upper bound
- adaptive adversaries
- human factor
- Human behavior
- honest-but-curious security
- games approach sequence
- Games
- game theory
- game parameters
- EASYCRYPT proof assistant
- Databases
- Cryptography
- Cryptographic Protocols
- concrete upper bounds
- composability
- Complexity theory
- collaboration