Formalization of Polynomially Bounded and Negligible Functions Using the Computer-Aided Proof-Checking System Mizar

In recent years, formal verification applications have attracted significant attention. In particular, verification of the security of cryptosystems has been investigated extensively. In this study, we attempt to develop various mathematical libraries for cryptology using the Mizar proof checking system. Polynomially bounded and negligible functions play very important roles in cryptology. Therefore, we introduce formalized definitions of polynomially bounded and negligible functions for formalizing cryptology in Mizar.

[1]  Hiroyuki Okazaki Probability on Finite and Discrete Set and Uniform Distribution , 2009, Formaliz. Math..

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Éva Tardos,et al.  Algorithm design , 2005 .

[4]  Piotr Rudnicki,et al.  Multivariate Polynomials with Arbitrary Number of Variables 1 , 2004 .

[5]  Yasunari Shidama,et al.  Probability on Finite Set and Real-Valued Random Variables , 2009, Formaliz. Math..

[6]  Yuichi Futa,et al.  Polynomially Bounded Sequences and Polynomial Sequences , 2015, Formaliz. Math..

[7]  Yasunari Shidama,et al.  Random Variables and Product of Probability Spaces , 2013, Formaliz. Math..

[8]  Yuichi Futa,et al.  Formalization of Definitions and Theorems Related to an Elliptic Curve Over a Finite Prime Field by Using Mizar , 2012, Journal of Automated Reasoning.

[9]  Yuichi Futa,et al.  Formal definition of probability on finite and discrete sample space for proving security of cryptographic systems using Mizar , 2013, Artif. Intell. Res..

[10]  Hiroyuki Okazaki,et al.  Posterior Probability on Finite Set , 2012, Formaliz. Math..

[11]  Yuichi Futa,et al.  Formalization of Gaussian integers, Gaussian rational numbers, and their algebraic structures with Mizar , 2012, 2012 International Symposium on Information Theory and its Applications.

[12]  Hiroyuki Okazaki,et al.  Algebra of Polynomially Bounded Sequences and Negligible Functions , 2015, Formaliz. Math..

[13]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[14]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[15]  Yasunari Shidama,et al.  Probability Measure on Discrete Spaces and Algebra of Real-Valued Random Variables , 2010, Formaliz. Math..

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Yasunari Shidama,et al.  Extended Euclidean Algorithm and CRT Algorithm , 2012, Formaliz. Math..