Cryptology ePrint Archive: Report 2011/485

Another Look at Automated Theorem-Proving. II

Neal Koblitz

Abstract: I continue the discussion initiated in part I of whether or not computer-assisted proofs are a promising approach to preventing errors in reductionist security arguments. I examine some recent papers that describe automated security proofs for hashed ElGamal encryption, Boneh-Franklin identity-based encryption, and OAEP.

Category / Keywords: public-key cryptography / public-key cryptography, automated proofs, proof checking, encryption

Publication Info: not submitted yet

Date: received 8 Sep 2011

Contact author: koblitz at uw edu

Available format(s): PDF | BibTeX Citation

Version: 20110910:014736 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]