|
| 1 | +--- |
| 2 | +title: Examples |
| 3 | +layout: default |
| 4 | +--- |
| 5 | + |
| 6 | +# Examples |
| 7 | + |
| 8 | +Below are a list of examples that ProofFrog can currently verify. |
| 9 | +Many are adapted from [The Joy of Cryptography](https://joyofcryptography.com/). |
| 10 | +In such cases, we will indicate which claim in the textbook is being proved. |
| 11 | + |
| 12 | +## One-Time Uniform Ciphertexts implies One-Time Secrecy |
| 13 | + |
| 14 | +This proves [Theorem 2.15](https://joyofcryptography.com/pdf/book.pdf#page=49). |
| 15 | + |
| 16 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/SymEnc/OTUC%3D%3EOTS.proof). |
| 17 | + |
| 18 | +## CPA$ Security implies CPA Security |
| 19 | + |
| 20 | +This proves [Claim 7.3](https://joyofcryptography.com/pdf/book.pdf#page=145) |
| 21 | + |
| 22 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/SymEnc/CPA%24%3D%3ECPA.proof). |
| 23 | + |
| 24 | +## Composing Two Symmetric Encryption Schemes for One-Time Uniform Ciphertexts |
| 25 | + |
| 26 | +This proof analyzes a symmetric encryption scheme {% katex %}\Sigma{% endkatex %} that composes two symmetric encryption schemes {% katex %}S{% endkatex %} and {% katex %}T{% endkatex %} where {% katex %}S.C = T.M{% endkatex %}, and |
| 27 | +{% katex display %} |
| 28 | +\Sigma.\mathrm{KeyGen}() = (S.\mathrm{KeyGen()}, T.\mathrm{KeyGen()}) |
| 29 | +{% endkatex %} |
| 30 | +{% katex display %} |
| 31 | +\Sigma.\mathrm{Enc}((k_S, k_T), m) = T.\mathrm{Enc}(k_T, S.\mathrm{Enc}(k_S, m)) |
| 32 | +{% endkatex %} |
| 33 | +{% katex display %} |
| 34 | +\Sigma.\mathrm{Dec}((k_S, k_T), c) = S.\mathrm{Dec}(k_S, T.\mathrm{Dec}(k_T, c)) |
| 35 | +{% endkatex %} |
| 36 | + |
| 37 | +If {% katex %}T{% endkatex %} has one-time uniform ciphertexts, then so does {% katex %}\Sigma{% endkatex %}. The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/SymEnc/GeneralDoubleOTUC.proof) |
| 38 | + |
| 39 | +## Composing Two Symmetric Encryption Schemes for CPA$ security |
| 40 | + |
| 41 | +This proof analyzes the same encryption scheme {% katex %}\Sigma{% endkatex %} as in the prior heading. If {% katex %}T{% endkatex %} is CPA$ secure, then so is {% katex %}\Sigma{% endkatex %}. The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/SymEnc/DoubleCPA%24.proof). |
| 42 | + |
| 43 | + |
| 44 | +## Double One-Time Pad has One-Time Uniform Ciphertexts |
| 45 | + |
| 46 | +This proves [Claim 2.13](https://joyofcryptography.com/pdf/book.pdf#page=45). |
| 47 | + |
| 48 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Book/2/2_13.proof). |
| 49 | + |
| 50 | +## Pseudo One-Time Pad has One-Time Uniform Ciphertexts |
| 51 | + |
| 52 | +This proves [Claim 5.4](https://joyofcryptography.com/pdf/book.pdf#page=102) |
| 53 | + |
| 54 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Book/5/5_3.proof). |
| 55 | + |
| 56 | +## Pseudorandomness of a length-tripling PRG |
| 57 | + |
| 58 | +This proves [Claim 5.5](https://joyofcryptography.com/pdf/book.pdf#page=105) |
| 59 | + |
| 60 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/PRG/TriplingPRGSecure.proof). |
| 61 | + |
| 62 | +## One-Time Secrecy implies CPA Security for Public Key Encryption Schemes |
| 63 | + |
| 64 | +This proves [Claim 15.5](https://joyofcryptography.com/pdf/book.pdf#page=273) |
| 65 | + |
| 66 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/PubEnc/OTS%3D%3ECPA.proof). |
| 67 | + |
| 68 | +## Hybrid Encryption is CPA secure |
| 69 | + |
| 70 | +This proves [Claim 15.9](https://joyofcryptography.com/pdf/book.pdf#page=279) |
| 71 | + |
| 72 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/PubEnc/Hybrid.proof). |
| 73 | + |
| 74 | +## Encrypt-then-MAC is CCA secure |
| 75 | + |
| 76 | +This proves [Claim 10.10](https://joyofcryptography.com/pdf/book.pdf#page=205) |
| 77 | + |
| 78 | +The proof file can be found [here](https://github.com/ProofFrog/examples/blob/main/Proofs/SymEnc/EncryptThenMACCCA.proof). |
0 commit comments