TY - JOUR
T1 - Verification methods for the computationally complete symbolic attacker based on indistinguishability
AU - Bana, Gergei
AU - Chadha, Rohit
AU - Eeralla, Ajay Kumar
AU - Okada, Mitsuhiro
N1 - Funding Information:
Gergei Bana was partially supported by the ERC Consolidator Grant CIRCUS (683032) and by the National Research Fund (FNR) of Luxembourg under the Pol-Lux project VoteVerif (POLLUX-IV/1/2016). Rohit Chadha and Ajay Kumar Eeralla were partially supported by NSF CNS 1314338 and NSF CNS 1553548. Mitsuhiro Okada was partially supported by JSPS KAKENHI Grants No. 17H02263, No. 17H02265, and No. JSPS-AYAME (2016–2018). Authors’ addresses: G. Bana, R. Chadha, and A. K. Eeralla, Department of Electrical Engineering and Computer Science, 201 Naka Hall, Columbia, MO 65211, USA; emails: bana@math.upenn.edu, chadhar@missouri.edu, ae266@mail.missouri.edu; M. Okada, Department of Philosophy, Keio University, 2-15-45 Mita, Minato-ku, Tokyo, 108-8345, Japan; email: mitsu@ abelard.flet.keio.ac.jp. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM. 1529-3785/2019/10-ART2 $15.00 https://doi.org/10.1145/3343508
Funding Information:
Gergei Bana was partially supported by the ERC Consolidator Grant CIRCUS (683032) and by the National Research Fund (FNR) of Luxembourg under the Pol-Lux project VoteVerif (POLLUX-IV/1/2016). Rohit Chadha and Ajay Kumar Eeralla were partially supported by NSF CNS 1314338 and NSF CNS 1553548. Mitsuhiro Okada was partially supported by JSPS KAKENHI Grants No. 17H02263, No. 17H02265, and No. JSPS-AYAME (2016-2018).
Publisher Copyright:
© 2019 Copyright held by the owner/author(s).
PY - 2019/10
Y1 - 2019/10
N2 - In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the technique of the computationally complete symbolic attacker of Bana and Comon (BC) [8]. In this article, we argue that the real breakthrough of this technique is the recent introduction of its version for indistinguishability [9], because, with the extensions we introduce here, for the first time, there is a computationally sound symbolic technique that is syntactically strikingly simple, to which translating standard computational security notions is a straightforward matter, and that can be effectively used for verification of not only equivalence properties but trace properties of protocols as well. We first fully develop the core elements of this newer version by introducing several new axioms. We illustrate the power and the diverse use of the introduced axioms on simple examples first. We introduce an axiom expressing the Decisional Diffie-Hellman property. We analyze the Diffie-Hellman key exchange, both in its simplest form and an authenticated version as well. We provide computationally sound verification of real-or-random secrecy of the Diffie-Hellman key exchange protocol formultiple sessions, without any restrictions on the computational implementation other than the DDH assumption. We also show authentication for a simplified version of the station-to-station protocol using UF-CMA assumption for digital signatures. Finally, we axiomatize IND-CPA, IND-CCA1, and IND-CCA2 security properties and illustrate their usage. We have formalized the axiomatic system in an interactive theorem prover, Coq, and have machine-checked the proofs of various auxiliary theorems and security properties of Diffie-Hellman and station-to-station protocol.
AB - In recent years, a new approach has been developed for verifying security protocols with the aim of combining the benefits of symbolic attackers and the benefits of unconditional soundness: the technique of the computationally complete symbolic attacker of Bana and Comon (BC) [8]. In this article, we argue that the real breakthrough of this technique is the recent introduction of its version for indistinguishability [9], because, with the extensions we introduce here, for the first time, there is a computationally sound symbolic technique that is syntactically strikingly simple, to which translating standard computational security notions is a straightforward matter, and that can be effectively used for verification of not only equivalence properties but trace properties of protocols as well. We first fully develop the core elements of this newer version by introducing several new axioms. We illustrate the power and the diverse use of the introduced axioms on simple examples first. We introduce an axiom expressing the Decisional Diffie-Hellman property. We analyze the Diffie-Hellman key exchange, both in its simplest form and an authenticated version as well. We provide computationally sound verification of real-or-random secrecy of the Diffie-Hellman key exchange protocol formultiple sessions, without any restrictions on the computational implementation other than the DDH assumption. We also show authentication for a simplified version of the station-to-station protocol using UF-CMA assumption for digital signatures. Finally, we axiomatize IND-CPA, IND-CCA1, and IND-CCA2 security properties and illustrate their usage. We have formalized the axiomatic system in an interactive theorem prover, Coq, and have machine-checked the proofs of various auxiliary theorems and security properties of Diffie-Hellman and station-to-station protocol.
KW - Authentication
KW - Computational model
KW - Computational soundness
KW - Dolev-Yao model
KW - First-order logic
KW - Secrecy
UR - http://www.scopus.com/inward/record.url?scp=85075614401&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85075614401&partnerID=8YFLogxK
U2 - 10.1145/3343508
DO - 10.1145/3343508
M3 - Article
AN - SCOPUS:85075614401
SN - 1529-3785
VL - 21
JO - ACM Transactions on Computational Logic
JF - ACM Transactions on Computational Logic
IS - 1
M1 - 2
ER -