Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516718
|View full text |Cite
|
Sign up to set email alerts
|

Using SMT solvers to automate design tasks for encryption and signature schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(34 citation statements)
references
References 47 publications
0
34
0
Order By: Relevance
“…Akinyele, Green, and Hohenberger [9] develop two synthesis tools for pairing-based cryptography. Their tool AutoGroup converts schemes in the Type I setting into schemes in the Type III setting, whereas their tool AutoStrong transforms an existentially unforgeable signature into a strongly unforgeable one, using SMT solvers to check whether the original signature satisfies a criterion allowing an efficient transformation.…”
Section: Other Related Workmentioning
confidence: 99%
“…Akinyele, Green, and Hohenberger [9] develop two synthesis tools for pairing-based cryptography. Their tool AutoGroup converts schemes in the Type I setting into schemes in the Type III setting, whereas their tool AutoStrong transforms an existentially unforgeable signature into a strongly unforgeable one, using SMT solvers to check whether the original signature satisfies a criterion allowing an efficient transformation.…”
Section: Other Related Workmentioning
confidence: 99%
“…The n-queens problem is a classic way to represent such a constraint satisfaction problem [22,32] and a common benchmark for such a solver [17]. Classification as a constraint satisfaction problem that can be solved by Z3 has proven to be successful in other design domains, such as automating design of encryption and signature schemes [1].…”
Section: :4mentioning
confidence: 99%
“…Several works have recently considered automated generation and/or analysis of cryptographic algorithms. Akinyele et al [AGHP12,AGH13] developed tools for automatically generating batch-verification algorithms for digital-signature schemes [AGHP12], for converting schemes using symmetric bilinear groups into ones using asymmetric bilinear groups [AGH13], and for compiling signature schemes to schemes achieving stronger security properties [AGH13]. In all these cases, their tools do not directly analyze or verify security of new constructions; instead, they take as input schemes that are assumed to be secure, and then attempt to apply a fixed set of transformations that have been proven to preserve (or amplify) security.…”
Section: Prior Workmentioning
confidence: 99%