Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review

Loading...
Thumbnail Image
File version

Accepted Manuscript (AM)

Author(s)
Xu, Yuexi
Li, Zhenyuan
Dong, Naipeng
Kuchta, Veronika
Hou, Zhe
Liu, Dongxi
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Bai, G

Ishikawa, F

Ait-Ameur, Y

Papadopoulos, GA

Date
2025
Size
File type(s)
Location

Limassol, Cyprus

License
Abstract

In the quantum computing era, the imperative role of post-quantum cryptography in securing digital communications has led to the development of computer-aided cryptography verification tools. These tools simplify the verification of post-quantum cryptography primitives and protocols, alleviating the challenges associated with manual proofs. This paper systematically reviews research in four main areas: quantum computing, post-quantum cryptography, cryptanalysis, and verification, establishing a foundation for future research. Emphasising the significance of challenges in post-quantum cryptography, we outline the current state of research on cryptography primitives and protocols. Categorising state-of-the-art computer-aided cryptography verification tools based on assumptions, models, and application levels, our analysis delves into each tool’s features, including modelling, adversary models, security properties, validation, and an in-depth analysis of their limitations. This comprehensive analysis offers insights into the nexus of post-quantum cryptography and computer-aided verification. Concluding with recommendations for researchers and practitioners, this paper explores potential future research directions.

Journal Title
Conference Title

Engineering of Complex Computer Systems: 28th International Conference, ICECCS 2024, Limassol, Cyprus, June 19–21, 2024, Proceedings

Book Title
Edition
Volume

14784

Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

This work is covered by copyright. You must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the document is available under a specified licence, refer to the licence for details of permitted re-use. If you believe that this work infringes copyright please make a copyright takedown request using the form at https://www.griffith.edu.au/copyright-matters.

Item Access Status
Note
Access the data
Related item(s)
Subject
Persistent link to this record
Citation

Xu, Y; Li, Z; Dong, N; Kuchta, V; Hou, Z; Liu, D, Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review, Engineering of Complex Computer Systems: 28th International Conference, ICECCS 2024, Limassol, Cyprus, June 19–21, 2024, Proceedings, 2025, 14784, pp. 346-366