Asynchronous Probabilistic Couplings in Higher-Order Separation Logic

SO Gregersen, A Aguirre, PG Haselwarter… - Proceedings of the …, 2024 - dl.acm.org
Probabilistic couplings are the foundation for many probabilistic relational program logics
and arise when relating random sampling statements across two programs. In relational …

Secure synthesis of distributed cryptographic applications (technical report)

C Acay, J Gancher, R Recto, AC Myers - arXiv preprint arXiv:2401.04131, 2024 - arxiv.org
Developing secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …

Secure synthesis of distributed cryptographic applications

C Acay, J Gancher, R Recto, AC Myers - IEEE Computer Security …, 2024 - cs.cornell.edu
Developing secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …

SSProve: A foundational framework for modular cryptographic proofs in Coq

PG Haselwarter, E Rivas, A Van Muylder… - ACM Transactions on …, 2023 - dl.acm.org
State-separating proofs (SSP) is a recent methodology for structuring game-based
cryptographic proofs in a modular way, by using algebraic laws to exploit the modular …

GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols

X Xie, Y Li, W Zhang, T Wang, S Xu, J Zhu… - 2024 IEEE Symposium …, 2024 - computer.org
Proving the security of a Multiparty Computation (MPC) protocol is a difficult task. Under the
current simulation-based definition of MPC, a security proof consists of a simulator, which is …

DT-SIM: Property-Based Testing for MPC Security

M Bates, J Near - arXiv preprint arXiv:2403.04991, 2024 - arxiv.org
Formal methods for guaranteeing that a protocol satisfies a cryptographic security definition
have advanced substantially, but such methods are still labor intensive and the need …

Bringing state-separating proofs to EasyCrypt-a security proof for Cryptobox

F Dupressoir, K Kohbrok, S Oechsner - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract Machine-checked cryptography aims to reinforce confidence in the primitives and
protocols that underpin all digital security. However, machine-checked proof techniques …

Formal Analysis of DTLS-SRTP Combined Protocol Based on Logic of Events

M Xiao, Y Zhong, Z Li, F Chen - Applied Sciences, 2024 - mdpi.com
Security analysis of composite protocols is a critical issue in the field of network security. In
complex network environments, the traditional approach of analyzing a single protocol …

[PDF][PDF] Higher-Order Separation Logic for Distributed Systems and Security

SO Gregersen - 2023 - pure.au.dk
Rigorous reasoning about implementations of software systems requires a detailed
mathematical model of the behavior of the programming language. However, real-world …

[PDF][PDF] A Theory of Composition for Proofs of Knowledge

A Kothapalli - 2024 - andrew.cmu.edu
Abstract In 1985, Goldwasser, Micali, and Rackoff introduced a compelling new notion of a
proof, known as a proof of knowledge, in which a verifier interactively checks that a prover …