Paper 2024/1078
GAuV: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols
Abstract
Proving the security of a Multiparty Computation (MPC) protocol is a difficult task. Under the current simulation-based definition of MPC, a security proof consists of a simulator, which is usually specific to the concrete protocol and requires to be manually constructed, together with a theoretical analysis of the output distribution of the simulator and corrupted parties' views in the real world. This presents an obstacle in verifying the security of a given MPC protocol. Moreover, an instance of a secure MPC protocol can easily lose its security guarantee due to careless implementation, and such a security issue is hard to detect in practice. In this work, we propose a general automated framework to verify the perfect security of instances of MPC protocols against the semi-honest adversary. Our framework has perfect soundness: any protocol that is proven secure under our framework is also secure under the simulation-based definition of MPC. We demonstrate the completeness of our framework by showing that for any instance of the well-known BGW protocol, our framework can prove its security for every corrupted party set with polynomial time. Unlike prior work that only focuses on black-box privacy which requires the outputs of corrupted parties to contain no information about the inputs of the honest parties, our framework may potentially be used to prove the security of arbitrary MPC protocols. We implement our framework as a prototype. The evaluation shows that our prototype automatically proves the perfect semi-honest security of BGW protocols and B2A (binary to arithmetic) conversion protocols in reasonable durations.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. IEEE Security & Privacy (S&P) 2024
- DOI
- 10.1109/SP54263.2024.00131
- Keywords
- multiparty computationperfect semi-honest securityautomated verificationgraph transformation
- Contact author(s)
-
namasikanam @ gmail com
liyifei 411 @ outlook com
zhangw23 @ mails tsinghua edu cn
wtw23 @ mails tsinghua edu cn
shizhen xu @ realai ai
dcszj @ mail tsinghua edu cn
yfsong @ mail tsinghua edu cn - History
- 2024-07-05: approved
- 2024-07-02: received
- See all versions
- Short URL
- https://ia.cr/2024/1078
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1078, author = {Xingyu Xie and Yifei Li and Wei Zhang and Tuowei Wang and Shizhen Xu and Jun Zhu and Yifan Song}, title = {{GAuV}: A Graph-Based Automated Verification Framework for Perfect Semi-Honest Security of Multiparty Computation Protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1078}, year = {2024}, doi = {10.1109/SP54263.2024.00131}, url = {https://eprint.iacr.org/2024/1078} }