Skip to main navigation Skip to search Skip to main content

EasyPQC: Verifying Post-Quantum Cryptography

  • Manuel Barbosa
  • , Gilles Barthe
  • , Xiong Fan
  • , Benjamin Grégoire
  • , Shih Han Hung
  • , Jonathan Katz
  • , Pierre Yves Strub
  • , Xiaodi Wu
  • , Li Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

EasyCrypt is a formal verification tool used extensively for formalizing concrete security proofs of cryptographic constructions. However, the EasyCrypt formal logics consider only classical at- tackers, which means that post-quantum security proofs cannot be formalized and machine-checked with this tool. In this paper we prove that a natural extension of the EasyCrypt core logics permits capturing a wide class of post-quantum cryptography proofs, settling a question raised by (Unruh, POPL 2019). Leveraging our positive result, we implement EasyPQC, an extension of EasyCrypt for post-quantum security proofs, and use EasyPQC to verify post- quantum security of three classic constructions: PRF-based MAC, Full Domain Hash and GPV08 identity-based encryption.

Original languageEnglish
Title of host publicationCCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages2564-2586
Number of pages23
ISBN (Electronic)9781450384544
DOIs
Publication statusPublished - 13 Nov 2021
Event27th ACM Annual Conference on Computer and Communication Security, CCS 2021 - Virtual, Online, Korea, Republic of
Duration: 15 Nov 202119 Nov 2021

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference27th ACM Annual Conference on Computer and Communication Security, CCS 2021
Country/TerritoryKorea, Republic of
CityVirtual, Online
Period15/11/2119/11/21

Keywords

  • formal verification
  • post-quantum cryptography

Fingerprint

Dive into the research topics of 'EasyPQC: Verifying Post-Quantum Cryptography'. Together they form a unique fingerprint.

Cite this