2021 IEEE 34th Computer Security Foundations Symposium (CSF) 2021
DOI: 10.1109/csf51468.2021.00048
|View full text |Cite
|
Sign up to set email alerts
|

SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq

Abstract: State-separating proofs (SSP) is a recent methodology for structuring game-based cryptographic proofs in a modular way. While very promising, this methodology was previously not fully formalized and came with little tool support. We address this by introducing SSProve, the first general verification framework for machine-checked state-separating proofs. SSProve combines high-level modular proofs about composed protocols, as proposed in SSP, with a probabilistic relational program logic for formalizing the lowe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 47 publications
0
8
0
Order By: Relevance
“…Note that, due to this verification done by the contract, the contract is able to detect if a party misbehaves. However, we do not prove formally that incorrect proofs do not verify since this is a probabilistic statement better suited for tools like EasyCrypt or SSProve (Abate et al, 2021).…”
Section: Conflicts Of Interestmentioning
confidence: 87%
“…Note that, due to this verification done by the contract, the contract is able to detect if a party misbehaves. However, we do not prove formally that incorrect proofs do not verify since this is a probabilistic statement better suited for tools like EasyCrypt or SSProve (Abate et al, 2021).…”
Section: Conflicts Of Interestmentioning
confidence: 87%
“…Step (1) applies "the averaging technique" by representing 𝐴.init() as a family of distributions 𝐷 m 𝐴 . (𝐷 m 𝐴 denotes the distribution in the family corresponding to memory m.) We write 𝜇 1 (𝐷 m 𝐴 , n) for the probability that 𝐷 m 𝐴 assigns to memory configuraion n. Then 𝜇 1 (𝐷 m 𝐴 , n) is the probability of 𝐴.𝑖𝑛𝑖𝑡 () terminating in the memory state n given that it starts in the initial state m. The rest of the computations are run starting from memory configuration n.…”
Section: Proofmentioning
confidence: 99%
“…In particular, a program with variables of type "real" (which is uncountable) would not be rewindable in that sense. 1 A security proof using rewinding would then only apply to rewindable adversaries which is not a restriction from the cryptographic point of view. (Typically, cryptographic adversaries are assumed to operate on data that is representable in a computer.…”
Section: Rewindingmentioning
confidence: 99%
See 1 more Smart Citation
“…In our mechanized formalization, the correctness and security guarantees provided by the underlying cryptographic primitives are baked into our semantics and notion of indistinguishability. There is a body of work about formally verified cryptography [Abate et al 2021;Barthe et al 2011Barthe et al , 2009, which could be integrated into our work in the future to provide a stronger formal guarantee. Some of these solutions have focused on verifying multiparty computation [Backes et al 2010;Haagh et al 2018].…”
Section: Related Workmentioning
confidence: 99%