How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

05/31/2018
by   David Butler, et al.
0

In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping their inputs private. Recent breakthroughs are bringing MPC into practice, solving fundamental challenges for secure distributed computation. Just as with classic protocols for encryption and key exchange, precise guarantees are needed for MPC designs and implementations; any flaw will give attackers a chance to break privacy or correctness. In this paper we present the first (as far as we know) formalisation of some MPC security proofs. These proofs provide probabilistic guarantees in the computational model of security, but have a different character to machine proofs and proof tools implemented so far --- MPC proofs use a simulation approach, in which security is established by showing indistinguishability between execution traces in the actual protocol execution and an ideal world where security is guaranteed by definition. We show that existing machinery for reasoning about probabilistic programs adapted to this setting, paving the way to precisely check a new class of cryptography arguments. We implement our proofs using the CryptHOL framework inside Isabelle/HOL.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/02/2019

Secure Computation for Machine Learning With SPDZ

Secure Multi-Party Computation (MPC) is an area of cryptography that ena...
research
06/19/2018

Computer-aided proofs for multiparty computation with active security

Secure multi-party computation (MPC) is a general cryptographic techniqu...
research
11/16/2020

Secured Distributed Algorithms without Hardness Assumptions

We study algorithms in the distributed message-passing model that produc...
research
08/06/2022

On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning

Proof-of-learning (PoL) proposes a model owner use machine learning trai...
research
09/06/2017

Distant decimals of π

We describe how to compute very far decimals of π and how to provide for...
research
04/12/2021

Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head

MPC-in-the-Head (MitH) is a general framework that allows constructing e...
research
06/01/2023

A Formal Model for Secure Multiparty Computation

Although Secure Multiparty Computation (SMC) has seen considerable devel...

Please sign up or login with your details

Forgot password? Click here to reset