Paper 2024/1078

GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols

Xingyu Xie, Tsinghua University, RealAI
Yifei Li, Tsinghua University
Wei Zhang, Tsinghua University
Tuowei Wang, Tsinghua University
Shizhen Xu, RealAI
Jun Zhu, Tsinghua University, RealAI
Yifan Song, Tsinghua University
Abstract

Proving the security of a Multiparty Computation (MPC) protocol is a difficult task. Under the current simulation-based definition of MPC, a security proof consists of a simulator, which is usually specific to the concrete protocol and requires to be manually constructed, together with a theoretical analysis of the output distribution of the simulator and corrupted parties' views in the real world. This presents an obstacle in verifying the security of a given MPC protocol. Moreover, an instance of a secure MPC protocol can easily lose its security guarantee due to careless implementation, and such a security issue is hard to detect in practice. In this work, we propose a general automated framework to verify the perfect security of instances of MPC protocols against the semi-honest adversary. Our framework has perfect soundness: any protocol that is proven secure under our framework is also secure under the simulation-based definition of MPC. We demonstrate the completeness of our framework by showing that for any instance of the well-known BGW protocol, our framework can prove its security for every corrupted party set with polynomial time. Unlike prior work that only focuses on black-box privacy which requires the outputs of corrupted parties to contain no information about the inputs of the honest parties, our framework may potentially be used to prove the security of arbitrary MPC protocols. We implement our framework as a prototype. The evaluation shows that our prototype automatically proves the perfect semi-honest security of BGW protocols and B2A (binary to arithmetic) conversion protocols in reasonable durations.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. IEEE Security & Privacy (S&P) 2024
DOI
10.1109/SP54263.2024.00131
Keywords
multiparty computationperfect semi-honest securityautomated verificationgraph transformation
Contact author(s)
namasikanam @ gmail com
liyifei 411 @ outlook com
zhangw23 @ mails tsinghua edu cn
wtw23 @ mails tsinghua edu cn
shizhen xu @ realai ai
dcszj @ mail tsinghua edu cn
yfsong @ mail tsinghua edu cn
History
2024-07-05: approved
2024-07-02: received
See all versions
Short URL
https://ia.cr/2024/1078
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1078,
      author = {Xingyu Xie and Yifei Li and Wei Zhang and Tuowei Wang and Shizhen Xu and Jun Zhu and Yifan Song},
      title = {{GAuV}: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols},
      howpublished = {Cryptology ePrint Archive, Paper 2024/1078},
      year = {2024},
      doi = {10.1109/SP54263.2024.00131},
      note = {\url{https://eprint.iacr.org/2024/1078}},
      url = {https://eprint.iacr.org/2024/1078}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.