Another look at automated theorem-proving II

I continue the discussion initiated in part I (published in this journal in 2007) of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers that describe automated security proofs for hashed ElGamal encry...

Full description

Bibliographic Details
Main Author: Koblitz Neal
Format: Article
Language:English
Published: De Gruyter 2012-02-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2011-0014
_version_ 1798040008748171264
author Koblitz Neal
author_facet Koblitz Neal
author_sort Koblitz Neal
collection DOAJ
description I continue the discussion initiated in part I (published in this journal in 2007) of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers that describe automated security proofs for hashed ElGamal encryption, Boneh–Franklin identity-based encryption, and OAEP.
first_indexed 2024-04-11T22:01:34Z
format Article
id doaj.art-99686c1ad81d4d0498c9bc967ca1deb0
institution Directory Open Access Journal
issn 1862-2976
1862-2984
language English
last_indexed 2024-04-11T22:01:34Z
publishDate 2012-02-01
publisher De Gruyter
record_format Article
series Journal of Mathematical Cryptology
spelling doaj.art-99686c1ad81d4d0498c9bc967ca1deb02022-12-22T04:00:54ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842012-02-0153-420522410.1515/jmc-2011-0014Another look at automated theorem-proving IIKoblitz Neal0Department of Mathematics, University of Washington, Box 354350, Seattle, WA 98195, USAI continue the discussion initiated in part I (published in this journal in 2007) of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers that describe automated security proofs for hashed ElGamal encryption, Boneh–Franklin identity-based encryption, and OAEP.https://doi.org/10.1515/jmc-2011-0014automated theorem-provingcomputer-assisted proofproof checkingpublic key cryptographyencryption
spellingShingle Koblitz Neal
Another look at automated theorem-proving II
Journal of Mathematical Cryptology
automated theorem-proving
computer-assisted proof
proof checking
public key cryptography
encryption
title Another look at automated theorem-proving II
title_full Another look at automated theorem-proving II
title_fullStr Another look at automated theorem-proving II
title_full_unstemmed Another look at automated theorem-proving II
title_short Another look at automated theorem-proving II
title_sort another look at automated theorem proving ii
topic automated theorem-proving
computer-assisted proof
proof checking
public key cryptography
encryption
url https://doi.org/10.1515/jmc-2011-0014
work_keys_str_mv AT koblitzneal anotherlookatautomatedtheoremprovingii