Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
José Bacelar AlmeidaManuel BarbosaManuel L. CorreiaKarim EldefrawyStéphane Graham-LengrandHugo PachecoVitor PereiraPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- access control
- information security
- computational complexity
- security requirements
- real time
- intrusion detection
- dynamic model
- security issues
- security mechanisms
- network security
- information assurance
- security problems
- security systems
- computer security
- flowshop
- closed loop
- np complete
- security analysis
- np hard
- optimal solution
- theorem proving
- temporal relations
- security level
- special case
- formal proof