Another look at automated theorem-proving II
I continue the discussion initiated in part I (published in this journal in 2007) of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers that describe automated security proofs for hashed ElGamal encry...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2012-02-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2011-0014 |
_version_ | 1798040008748171264 |
---|---|
author | Koblitz Neal |
author_facet | Koblitz Neal |
author_sort | Koblitz Neal |
collection | DOAJ |
description | I continue the discussion initiated in part I (published in
this journal in 2007) of whether
or not computer-assisted proofs are a promising approach to
preventing errors in reductionist security arguments. I
examine some recent papers that describe automated
security proofs for hashed ElGamal encryption, Boneh–Franklin
identity-based encryption, and OAEP. |
first_indexed | 2024-04-11T22:01:34Z |
format | Article |
id | doaj.art-99686c1ad81d4d0498c9bc967ca1deb0 |
institution | Directory Open Access Journal |
issn | 1862-2976 1862-2984 |
language | English |
last_indexed | 2024-04-11T22:01:34Z |
publishDate | 2012-02-01 |
publisher | De Gruyter |
record_format | Article |
series | Journal of Mathematical Cryptology |
spelling | doaj.art-99686c1ad81d4d0498c9bc967ca1deb02022-12-22T04:00:54ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842012-02-0153-420522410.1515/jmc-2011-0014Another look at automated theorem-proving IIKoblitz Neal0Department of Mathematics, University of Washington, Box 354350, Seattle, WA 98195, USAI continue the discussion initiated in part I (published in this journal in 2007) of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers that describe automated security proofs for hashed ElGamal encryption, Boneh–Franklin identity-based encryption, and OAEP.https://doi.org/10.1515/jmc-2011-0014automated theorem-provingcomputer-assisted proofproof checkingpublic key cryptographyencryption |
spellingShingle | Koblitz Neal Another look at automated theorem-proving II Journal of Mathematical Cryptology automated theorem-proving computer-assisted proof proof checking public key cryptography encryption |
title | Another look at automated theorem-proving II |
title_full | Another look at automated theorem-proving II |
title_fullStr | Another look at automated theorem-proving II |
title_full_unstemmed | Another look at automated theorem-proving II |
title_short | Another look at automated theorem-proving II |
title_sort | another look at automated theorem proving ii |
topic | automated theorem-proving computer-assisted proof proof checking public key cryptography encryption |
url | https://doi.org/10.1515/jmc-2011-0014 |
work_keys_str_mv | AT koblitzneal anotherlookatautomatedtheoremprovingii |