CV2EC: Getting the Best of Both Worlds

Bruno Blanchet, Pierre Boutry, Christian Doczkal, Benjamin Gregoire, Pierre Yves Strub

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We define and implement CV2EC, a translation from CryptoVerif assumptions on primitives to EasyCrypt games. CryptoVerif and EasyCrypt are two proof tools for mechanizing game-based proofs. While CryptoVerif is primarily suited for verifying security protocols, EasyCrypt has the expressive power for verifying cryptographic primitives and schemes. CV2EC allows us to prove security protocols in CryptoVerif and then use EasyCrypt to prove the assumptions made in CryptoVerif, either directly or by reducing them to lower-level or more standard cryptographic assumptions. We apply this approach to several case studies: we prove the multikey computational and gap Diffie-Hellman assumptions used in CryptoVerif from the standard version of these assumptions; we also prove an n-user security property of authenticated key encapsulation mechanisms (KEMs), used in the CryptoVerif study of hybrid public-key encryption (HPKE), from the 2-user version. By doing that, we discovered errors in the paper proof of this property, which we reported to the authors who then fixed their proof.

Original languageEnglish
Title of host publicationProceedings - 2024 IEEE 37th Computer Security Foundations Symposium, CSF 2024
PublisherIEEE Computer Society
Pages279-294
Number of pages16
ISBN (Electronic)9798350362039
DOIs
Publication statusPublished - 1 Jan 2024
Externally publishedYes
Event37th IEEE Computer Security Foundations Symposium, CSF 2024 - Enschede, Netherlands
Duration: 8 Jul 202412 Jul 2024

Publication series

NameProceedings - IEEE Computer Security Foundations Symposium
ISSN (Print)1940-1434

Conference

Conference37th IEEE Computer Security Foundations Symposium, CSF 2024
Country/TerritoryNetherlands
CityEnschede
Period8/07/2412/07/24

Keywords

  • combining tools
  • computational model
  • mechanized proofs
  • security protocols

Fingerprint

Dive into the research topics of 'CV2EC: Getting the Best of Both Worlds'. Together they form a unique fingerprint.

Cite this