Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.98CB36226)
DOI: 10.1109/lics.1998.705646
|View full text |Cite
|
Sign up to set email alerts
|

Efficient representation and validation of proofs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(33 citation statements)
references
References 11 publications
0
33
0
Order By: Relevance
“…Existing first-order provers, that embody the results of years of research on data structures and algorithms for deduction, could be applied, or at least their code could be reused, offering a higher degree of assurance about soundness and completeness of the procedure. Furthermore, theorem-proving strategies support proof generation and model generation, that are two more desiderata of satisfiability procedures (e.g., [Necula and Lee 1998;Lahiri and Musuvathi 2005a]), in a theory-independent way. Indeed, if the input is unsatisfiable, the strategy generates a proof with no additional effort.…”
Section: Introductionmentioning
confidence: 99%
“…Existing first-order provers, that embody the results of years of research on data structures and algorithms for deduction, could be applied, or at least their code could be reused, offering a higher degree of assurance about soundness and completeness of the procedure. Furthermore, theorem-proving strategies support proof generation and model generation, that are two more desiderata of satisfiability procedures (e.g., [Necula and Lee 1998;Lahiri and Musuvathi 2005a]), in a theory-independent way. Indeed, if the input is unsatisfiable, the strategy generates a proof with no additional effort.…”
Section: Introductionmentioning
confidence: 99%
“…Foundational PCC [2,18] attempts to reduce the trusted computing base of PCC to solely the foundations of mathematical logic. Bernard and Lee [5] propose a new temporal logic to express PCC policies for machine code.Non-SAT-based techniques for minimizing PCC proof sizes [29,32] and formalizing machine code semantics [24] have also been proposed. Our work uses proofs to certify software but is applicable to safety as well as liveness specifications, and at the source code level.…”
Section: Related Workmentioning
confidence: 99%
“…Initial PCC works used as certificates a lambda-term encoding of proofs [Nec97] to be type-checked by the Logical Framework (LF). To optimise the size of these proofs, Necula and Lee proposed LF i a compressed proof format for LF terms [NL98]. For a weaker logic, Necula and Rahul transmit as certificate an oracle (a stream of bits) that guides a higher-order logic interpreter in its proof search [NR01].…”
Section: Introductionmentioning
confidence: 99%