How to simulate it in Isabelle: towards formal proof for secure multi-party computation
From MaRDI portal
(Redirected from Publication:1687724)
Abstract: In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping their inputs private. Recent breakthroughs are bringing MPC into practice, solving fundamental challenges for secure distributed computation. Just as with classic protocols for encryption and key exchange, precise guarantees are needed for MPC designs and implementations; any flaw will give attackers a chance to break privacy or correctness. In this paper we present the first (as far as we know) formalisation of some MPC security proofs. These proofs provide probabilistic guarantees in the computational model of security, but have a different character to machine proofs and proof tools implemented so far --- MPC proofs use a emph{simulation} approach, in which security is established by showing indistinguishability between execution traces in the actual protocol execution and an ideal world where security is guaranteed by definition. We show that existing machinery for reasoning about probabilistic programs adapted to this setting, paving the way to precisely check a new class of cryptography arguments. We implement our proofs using the CryptHOL framework inside Isabelle/HOL.
Recommendations
- Computationally sound abstraction and verification of secure multi-party computations
- From secrecy to soundness: efficient verification via secure computation (extended abstract)
- An equational approach to secure multi-party computation
- Verifying Secure Speculation in Isabelle/HOL
- scientific article; zbMATH DE number 2090144
- General composition and universal composability in secure multiparty computation
- Secure two-party computation in applied pi-calculus: models and verification
- Formalizing provable anonymity in Isabelle/HOL
- scientific article; zbMATH DE number 2086504
Cites work
- scientific article; zbMATH DE number 176564 (Why is no real title available?)
- A proof of security of Yao's protocol for two-party computation
- Computer-Aided Security Proofs for the Working Cryptographer
- Efficient constant round multi-party computation combining BMR and SPDZ
- Efficient oblivious transfer protocols
- Formal certification of code-based cryptographic proofs
- How to simulate it -- a tutorial on the simulation proof technique
- New directions in cryptography
- On the security of public key protocols
- Probabilistic functions and cryptographic oracles in higher order logic
Cited in
(3)
This page was built for publication: How to simulate it in Isabelle: towards formal proof for secure multi-party computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1687724)