Universal Composability (UC) is the gold standard for cryptographic security, but mechanizing proofs of UC is notoriously difficult. A recently-discovered connection between UC and Robust Compilation (RC)—a novel theory of secure compilation—provides a means to verify UC proofs using tools that mechanize equality results. Unfortunately, the existing methods apply only to perfect UC security, and real-world protocols relying on cryptography are only computationally secure. This paper addresses this gap by lifting the connection between UC and RC to the computational setting, extending techniques from the RC setting to apply to computational UC security. Moreover, it further generalizes the UC–RC connection beyond computational security to arbitrary equalities, providing a framework to subsume the existing perfect case, and to instantiate future theories with more complex notions of security. This connection allows the use of tools for proofs of computational indistinguishability to properly mechanize proofs of computational UC security. We demonstrate this power by using CryptoVerif to mechanize a proof that parts of the Wireguard protocol are computationally UC secure. Finally, all proofs of the framework itself are verified in Isabelle/HOL.
History
Primary Research Area
Reliable Security Guarantees
Open Access Type
Green
BibTeX
@misc{Künnemann:Patrignani:Cecchetti:2024,
title = "Computationally Bounded Robust Compilation and Universally Composable Security",
author = "Künnemann, Robert" AND "Patrignani, Marco" AND "Cecchetti, Ethan",
year = 2024,
month = 1,
doi = "10.48550/arxiv.2401.15041"
}