{"title":"正式的通用身份验证数据结构","authors":"M. Brun, Dmitriy Traytel","doi":"10.4230/LIPIcs.ITP.2019.10","DOIUrl":null,"url":null,"abstract":"8 Authenticated data structures are a technique for outsourcing data storage and maintenance to an 9 untrusted server. The server is required to produce an efficiently checkable and cryptographically 10 secure proof that it carried out precisely the requested computation. Recently, Miller et al. [10] 11 demonstrated how to support a wide range of such data structures by integrating an authentication 12 construct as a first class citizen in a functional programming language. In this paper, we put this 13 work to the test of formalization in the Isabelle proof assistant. With Isabelle’s help, we uncover 14 and repair several mistakes and modify the small-step semantics to perform call-by-value evaluation 15 rather than requiring terms to be in administrative normal form. 16 2012 ACM Subject Classification Security and privacy → Logic and verification 17","PeriodicalId":296683,"journal":{"name":"International Conference on Interactive Theorem Proving","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Generic Authenticated Data Structures, Formally\",\"authors\":\"M. Brun, Dmitriy Traytel\",\"doi\":\"10.4230/LIPIcs.ITP.2019.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"8 Authenticated data structures are a technique for outsourcing data storage and maintenance to an 9 untrusted server. The server is required to produce an efficiently checkable and cryptographically 10 secure proof that it carried out precisely the requested computation. Recently, Miller et al. [10] 11 demonstrated how to support a wide range of such data structures by integrating an authentication 12 construct as a first class citizen in a functional programming language. In this paper, we put this 13 work to the test of formalization in the Isabelle proof assistant. With Isabelle’s help, we uncover 14 and repair several mistakes and modify the small-step semantics to perform call-by-value evaluation 15 rather than requiring terms to be in administrative normal form. 16 2012 ACM Subject Classification Security and privacy → Logic and verification 17\",\"PeriodicalId\":296683,\"journal\":{\"name\":\"International Conference on Interactive Theorem Proving\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Interactive Theorem Proving\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4230/LIPIcs.ITP.2019.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Interactive Theorem Proving","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.ITP.2019.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
8 Authenticated data structures are a technique for outsourcing data storage and maintenance to an 9 untrusted server. The server is required to produce an efficiently checkable and cryptographically 10 secure proof that it carried out precisely the requested computation. Recently, Miller et al. [10] 11 demonstrated how to support a wide range of such data structures by integrating an authentication 12 construct as a first class citizen in a functional programming language. In this paper, we put this 13 work to the test of formalization in the Isabelle proof assistant. With Isabelle’s help, we uncover 14 and repair several mistakes and modify the small-step semantics to perform call-by-value evaluation 15 rather than requiring terms to be in administrative normal form. 16 2012 ACM Subject Classification Security and privacy → Logic and verification 17