Skip to content
Publicly Available Published by De Gruyter February 5, 2008

Another look at automated theorem-proving

  • Neal Koblitz

I examine the use of automated theorem-proving for reductionist security arguments in cryptography and discuss three papers that purport to show the potential of computer-assisted proof-writing and proof-checking. I look at the proofs that the authors give to illustrate the “game-hopping” technique — for Full-Domain Hash signatures, ElGamal encryption, and Cramer-Shoup encryption — and ask whether there is evidence that automated theorem-proving can contribute anything of value to the security analysis of cryptographic protocols.

Received: 2007-August-08
Published Online: 2008-02-05
Published in Print: 2007-12

© de Gruyter

Downloaded on 19.3.2024 from https://www.degruyter.com/document/doi/10.1515/jmc.2007.020/html
Scroll to top button