too. As a starting point, we have outlined the basic
data types, functions to manipulate those data types,
and proposed a general library template that can con-
struct ABS scheme automatically. Building upon this
preliminary work will require not just implementing
the ideas presented in this paper, but also borrowing
knowledge and theories from the logic and automated
reasoning communities to build a tool that not only
produces correct constructions, but is also grounded
in a rigorous theoretical framework.
REFERENCES
Ambrona, M., Barthe, G., Gay, R., and Wee, H.
(2017). Attribute-based encryption in the generic
group model: Automated proofs and new construc-
tions. In Proceedings of the 2017 ACM CCS, pages
647–664.
Ambrona, M., Barthe, G., and Schmidt, B. (2016). Auto-
mated unbounded analysis of cryptographic construc-
tions in the generic group model. In Advances in
Cryptology - EUROCRYPT 2016, pages 822–851.
Barthe, G., Crespo, J. M., Gr
´
egoire, B., Kunz, C.,
Lakhnech, Y., Schmidt, B., and Zanella-B
´
eguelin, S.
(2013a). Fully automated analysis of padding-based
encryption in the computational model. In Proceed-
ings of the 2013 ACM CCS, CCS ’13, pages 1247–
1260.
Barthe, G., Dupressoir, F., Gr
´
egoire, B., Kunz, C., Schmidt,
B., and Strub, P. (2013b). Easycrypt: A tutorial. In
Foundations of Security Analysis and Design FOSAD,
pages 146–166.
Barthe, G., Fagerholm, E., Fiore, D., Mitchell, J. C., Sce-
drov, A., and Schmidt, B. (2014). Automated analysis
of cryptographic assumptions in generic group mod-
els. In Advances in Cryptology - CRYPTO, pages 95–
112.
Barthe, G., Gr
´
egoire, B., Heraud, S., and B
´
eguelin, S. Z.
(2011). Computer-aided security proofs for the work-
ing cryptographer. In Advances in Cryptology -
CRYPTO, pages 71–90.
Barthe, G., Gr
´
egoire, B., and Schmidt, B. (2015). Auto-
mated proofs of pairing-based cryptography. In Pro-
ceedings of the 22nd ACM Conference on Computer
and Communications Security, CCS, pages 1156–
1168.
Barthe, G., Gr
´
egoire, B., and Zanella-B
´
eguelin, S. (2009).
Formal certification of code-based cryptographic
proofs. In 36th ACM SIGPLAN-SIGACT POPL 2009,
pages 90–101. ACM.
Blanchet, B. (2006). A computationally sound mechanized
prover for security protocols. In 2006 IEEE Sympo-
sium on Security and Privacy (S&P), pages 140–154.
Boneh, D. and Boyen, X. (2004). Short signatures without
random oracles. In Eurocrypt, pages 56–73. Springer.
Boneh, D., Boyen, X., and Shacham, H. (2004). Short
group signatures. In Crypto, pages 41–55. Springer.
Boyen, X. and Waters, B. (2006). Compact group signature
without random oracles. In Eurocrypt, pages 427–
444. Springer.
Datta, P., Okamoto, T., and Tomida, J. (2018). Full-hiding
(unbounded) multi-inner product functional encryp-
tion from the k-linear assumption. In To appear in
PKC.
Dolev, D. and Yao, A. C. (1983). On the security of pub-
lic key protocols. IEEE Transactions on Information
Theory, 29(2):198–207.
El Kaafarani, A., Ghadafi, E., and Khader, D. (2014). De-
centralized traceable attribute-based signatures. In
Benaloh, J., editor, Topics in Cryptology – CT-RSA
2014, pages 327–348, Cham. Springer International
Publishing.
Escala, A., Herranz, J., and Morillo, P. (2011). Revocable
attribute-based signatures with adaptive security in the
standard model. In Nitaj, A. and Pointcheval, D., ed-
itors, Progress in Cryptology – AFRICACRYPT 2011,
pages 224–241, Berlin, Heidelberg. Springer Berlin
Heidelberg.
Groth, J. and Sahai, A. (2008). Efficient non-interactive
proof systems for bilinear groups. In Eurocrypt, pages
415–432.
Halevi, S. (2005). A plausible approach to computer-aided
cryptographic proofs. Cryptology ePrint Archive, Re-
port 2005/181.
labs, I. The Coq proof assistant. https://coq.inria.fr/.
Maji, H. K., Prabhakaran, M., and Rosulek, M. (2011).
Attribute-based signatures. In Kiayias, A., editor, Top-
ics in Cryptology – CT-RSA 2011, pages 376–392,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Petcher, A. and Morrisett, G. (2015). The foundational
cryptography framework. In Principles of Security
and Trust - 4th International Conference, POST, Pro-
ceedings, pages 53–72.
Waters, B. (2005). Efficient identity-based encryption with-
out random oracles. In Eurocrypt, pages 114–127.
Springer.
SECRYPT 2018 - International Conference on Security and Cryptography
542