Главная
Study mode:
on
1
Intro
2
Proactive Security
3
Fundamental MPC Protocol: BGW'88
4
Sample Module: ElGamal
5
Existing Verification Work of Secure Computation
6
Sample Abstract Definition: Secret Sharing (SS)
7
Sample Abstract Definition: Verifiable SS
8
Sample instantiation of Primitive (SS) 1/3
9
Instantiation of Secret Sharing Framework
10
Sample Abstract (MPC) Protocol Definition
11
MPC Abstract Protocol Framework
12
Sample instantiation of Protocol (Recover)
13
Sample EasyCrypt Proof Skeleton (Passive)
14
Sample Security Game (for SS)
15
Toolchain to Synthesize Executable Software
16
Performance of Extracted Executable 1/2
17
Frequently Asked Questions/Objections
18
Conclusion
Description:
Explore a conference talk on computer-aided verification and software synthesis for secure multi-party computation (MPC) protocols. Delve into the progress made in developing high-assurance implementations of MPC, including the formalization of secret sharing variations and MPC protocols in EasyCrypt. Learn about the computer-checked security proofs of concrete protocol instantiations and the first computer-aided verification and automated synthesis of the fundamental BGW protocol. Discover a new toolchain for extracting high-assurance executable implementations from EasyCrypt specifications, and compare the performance of these executables to manually implemented versions. Gain insights into the benefits of high-assurance implementations for correctness and security in MPC protocols.

Computer Aided Verification and Software Synthesis for Secure Multi Party Computation Protocols

TheIACR
Add to list