Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head

MPC-in-the-Head (MitH) is a general framework that allows constructing efficient Zero Knowledge protocols for general NP-relations from secure multiparty computation (MPC) protocols. In this paper we give the first machine-checked implementation of this transformation. We begin with an EasyCrypt formalization of MitH that preserves the modular structure of MitH and can be instantiated with arbitrary MPC protocols that satisfy standard notions of security, which allows us to leverage an existing machine-checked secret-sharing-based MPC protocol development. The resulting concrete ZK protocol is proved secure and correct in EasyCrypt. Using a recently developed code extraction mechanism for EasyCrypt we synthesize a formally verified implementation of the protocol, which we benchmark to get an indication of the overhead associated with our formalization choices and code extraction mechanism.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/02/2019

Secure Computation for Machine Learning With SPDZ

Secure Multi-Party Computation (MPC) is an area of cryptography that ena...
research
11/17/2017

WYS*: A Verified Language Extension for Secure Multi-party Computations

Secure multi-party computation (MPC) enables a set of mutually distrusti...
research
05/31/2018

How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation

In cryptography, secure Multi-Party Computation (MPC) protocols allow pa...
research
06/02/2023

Network Agnostic MPC with Statistical Security

We initiate the study of the network agnostic MPC protocols with statist...
research
07/18/2023

From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake

It is universally acknowledged that Wi-Fi communications are important t...
research
09/14/2022

SEEK: model extraction attack against hybrid secure inference protocols

Security concerns about a machine learning model used in a prediction-as...
research
06/06/2023

mdTLS: How to Make middlebox-aware TLS more efficient?

The more data transmission over TLS protocol becomes increasingly common...

Please sign up or login with your details

Forgot password? Click here to reset