A large effort is usually required to have a theorem prover establish a complex theorem. Having invested this effort, how can we store the result for later use, or communicate it to others while preserving our trust in its validity? This paper discusses the use of digital signatures to store and exchange theorems in a secure way. 1 Introduction Suppose you have gone to the trouble of proving a theorem using a mechanical theorem prover. If your work is to have any enduring value, you have to be able to save your result for later use and communicate it to others. A theorem prover should allow its users to create and modify theorems only in a sound way. However, once outside the theorem prover --- for example while saved on disk or being tran...
AbstractWe investigate the improvement of theorem proving by reusing previously computed proofs. We ...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
When a proof-checking kernel completes the checking of a formal proof, that kernel asserts that a sp...
International audienceMost computer checked proofs are tied to the particular technology of a prover...
Nowadays, people are looking for the easiest way to do things. The digital world has made that even ...
Provable security is a sub-discipline of cryptography that is used to demonstrate in a rigorous mann...
Most theorem provers are either hard to trust because they are large programs or hard to use due to ...
This paper presents a new simple schemes for verifiable encryption of digital signatures. We make us...
I examine the use of automated theorem-proving for reductionist security arguments in cryptography a...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
Cryptography is used to protect data and communications. The basic tools are cryptographic primitiv...
Abstract—As digital storage and cloud processing become more common in business infrastructure and s...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
Abstract. A fundamental strength of interactive theorem provers (ITPs) is the high degree of trust o...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
AbstractWe investigate the improvement of theorem proving by reusing previously computed proofs. We ...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
When a proof-checking kernel completes the checking of a formal proof, that kernel asserts that a sp...
International audienceMost computer checked proofs are tied to the particular technology of a prover...
Nowadays, people are looking for the easiest way to do things. The digital world has made that even ...
Provable security is a sub-discipline of cryptography that is used to demonstrate in a rigorous mann...
Most theorem provers are either hard to trust because they are large programs or hard to use due to ...
This paper presents a new simple schemes for verifiable encryption of digital signatures. We make us...
I examine the use of automated theorem-proving for reductionist security arguments in cryptography a...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
Cryptography is used to protect data and communications. The basic tools are cryptographic primitiv...
Abstract—As digital storage and cloud processing become more common in business infrastructure and s...
Digital signatures are a powerful tool for demonstrating data integrity and performing source authen...
Abstract. A fundamental strength of interactive theorem provers (ITPs) is the high degree of trust o...
An encryption method is presented with the novel property that publicly revealing an encryption key ...
AbstractWe investigate the improvement of theorem proving by reusing previously computed proofs. We ...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
When a proof-checking kernel completes the checking of a formal proof, that kernel asserts that a sp...