State separation for code-based game-playing proofs

C Brzuska, A Delignat-Lavaud, C Fournet… - Advances in Cryptology …, 2018 - Springer
The security analysis of real-world protocols involves reduction steps that are conceptually
simple but still have to account for many protocol complications found in standards and …

SSProve: A foundational framework for modular cryptographic proofs in Coq

PG Haselwarter, E Rivas, A Van Muylder… - ACM Transactions on …, 2023 - dl.acm.org
State-separating proofs (SSP) is a recent methodology for structuring game-based
cryptographic proofs in a modular way, by using algebraic laws to exploit the modular …

Language-Based Security for Low-Level MPC

C Skalka, J Near - Proceedings of the 26th International Symposium on …, 2024 - dl.acm.org
Secure Multi-Party Computation (MPC) is an important enabling technology for data privacy
in modern distributed applications. Currently, proof methods for low-level MPC protocols are …

Adaptive Distributional Security for Garbling Schemes with  Online Complexity

EA Bock, C Brzuska, P Karanko, S Oechsner… - … Conference on the …, 2023 - Springer
Garbling schemes allow to garble a circuit C and an input x such that C (x) can be computed
while hiding both C and x. In the context of adaptive security, an adversary specifies the …

Bringing state-separating proofs to EasyCrypt a security proof for cryptobox

F Dupressoir, K Kohbrok… - 2022 IEEE 35th Computer …, 2022 - ieeexplore.ieee.org
Machine-checked cryptography aims to reinforce confidence in the primitives and protocols
that underpin all digital security. However, machine-checked proof techniques remain in …

State-separating proofs and their applications

K Kohbrok - 2023 - aaltodoc.aalto.fi
Cryptographic protocols are commonly used to provide security for network traffic and digital
interactions in general. Security means different things in different contexts. The most …

CryptoZoo: A Viewer for Reduction Proofs

C Brzuska, C Egger, K Puniamurthy - International Conference on Applied …, 2024 - Springer
Cryptographers rely on visualization to effectively communicate cryptographic constructions
with one another. Visual frameworks such as constructive cryptography (TOSCA 2011), the …

Adaptive Distributional Security for Garbling Schemes with Online Complexity

EA Bock, C Brzuska, P Karanko, S Oechsner… - Cryptology ePrint …, 2024 - eprint.iacr.org
Garbling schemes allow to garble a circuit $ C $ and an input $ x $ such that $ C (x) $ can be
computed while hiding both $ C $ and $ x $. In the context of adaptive security, an adversary …

Bringing state-separating proofs to EasyCrypt-a security proof for Cryptobox

F Dupressoir, K Kohbrok, S Oechsner - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract Machine-checked cryptography aims to reinforce confidence in the primitives and
protocols that underpin all digital security. However, machine-checked proof techniques …

Formal Verification of the Sumcheck Protocol

AA Garvia Bosshard - 2023 - research-collection.ethz.ch
The sumcheck protocol is an interactive proof which is widely used in computational
complexity and cryptography. First introduced in 1992, the proofs of its security properties …