SAT-Based Finite Model Generation for Higher-Order Logic
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Deduction Systems Based on Resolution, We Limit the Following Considerations to Transition Systems Based on Analytic Calculi
Author’s Address Norbert Eisinger European Computer–Industry Research Centre, ECRC Arabellastr. 17 D-8000 M¨unchen 81 F. R. Germany [email protected] and Hans J¨urgen Ohlbach Max–Planck–Institut f¨ur Informatik Im Stadtwald D-6600 Saarbr¨ucken 11 F. R. Germany [email protected] Publication Notes This report appears as chapter 4 in Dov Gabbay (ed.): ‘Handbook of Logic in Artificial Intelligence and Logic Programming, Volume I: Logical Foundations’. It will be published by Oxford University Press, 1992. Fragments of the material already appeared in chapter two of Bl¨asis & B¨urckert: Deduction Systems in Artificial Intelligence, Ellis Horwood Series in Artificial Intelligence, 1989. A draft version has been published as SEKI Report SR-90-12. The report is also published as an internal technical report of ECRC, Munich. Acknowledgements The writing of the chapters for the handbook has been a highly coordinated effort of all the people involved. We want to express our gratitude for their many helpful contributions, which unfortunately are impossible to list exhaustively. Special thanks for reading earlier drafts and giving us detailed feedback, go to our second reader, Bob Kowalski, and to Wolfgang Bibel, Elmar Eder, Melvin Fitting, Donald W. Loveland, David Plaisted, and J¨org Siekmann. Work on this chapter started when both of us were members of the Markgraf Karl group at the Universit¨at Kaiserslautern, Germany. With our former colleagues there we had countless fruitful discus- sions, which, again, cannot be credited in detail. During that time this research was supported by the “Sonderforschungsbereich 314, K¨unstliche Intelligenz” of the Deutsche Forschungsgemeinschaft (DFG). -
Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs∗
Substitution-permutation networks, pseudorandom functions, and natural proofs∗ Eric Miles† Emanuele Viola‡ August 20, 2015 Abstract This paper takes a new step towards closing the gap between pseudorandom func- tions (PRF) and their popular, bounded-input-length counterparts. This gap is both quantitative, because these counterparts are more efficient than PRF in various ways, and methodological, because these counterparts usually fit in the substitution-permutation network paradigm (SPN), which has not been used to construct PRF. We give several candidate PRF that are inspired by the SPN paradigm. Most Fi of our candidates are more efficient than previous ones. Our main candidates are: : 0, 1 n 0, 1 n is an SPN whose S-box is a random function on b bits given F1 { } → { } as part of the seed. We prove that resists attacks that run in time 2ǫb. F1 ≤ : 0, 1 n 0, 1 n is an SPN where the S-box is (patched) field inversion, F2 { } → { } a common choice in practical constructions. We show that is computable with F2 boolean circuits of size n logO(1) n, and that it has exponential security 2Ω(n) against · linear and differential cryptanalysis. : 0, 1 n 0, 1 is a non-standard variant on the SPN paradigm, where F3 { } → { } “states” grow in length. We show that is computable with TC0 circuits of size F3 n1+ǫ, for any ǫ> 0, and that it is almost 3-wise independent. : 0, 1 n 0, 1 uses an extreme setting of the SPN parameters (one round, F4 { } → { } one S-box, no diffusion matrix). The S-box is again (patched) field inversion. -
Mutation COS 326 Speaker: Andrew Appel Princeton University
Mutation COS 326 Speaker: Andrew Appel Princeton University slides copyright 2020 David Walker and Andrew Appel permission granted to reuse these slides for non-commercial educational purposes C structures are mutable, ML structures are immutable C program OCaml program let fst(x:int,y:int) = x struct foo {int x; int y} *p; let p: int*int = ... in int a,b,u; let a = fst p in a = p->x; let u = f p in u = f(p); let b = fst p in b = p->x; xxx (* does a==b? Yes! *) /* does a==b? maybe */ 2 Reasoning about Mutable State is Hard mutable set immutable set insert i s1; let s1 = insert i s0 in f x; f x; member i s1 member i s1 Is member i s1 == true? … – When s1 is mutable, one must look at f to determine if it modifies s1. – Worse, one must often solve the aliasing problem. – Worse, in a concurrent setting, one must look at every other function that any other thread may be executing to see if it modifies s1. 3 Thus far… We have considered the (almost) purely functional subset of OCaml. – We’ve had a few side effects: printing & raising exceptions. Two reasons for this emphasis: – Reasoning about functional code is easier. • Both formal reasoning – equationally, using the substitution model – and informal reasoning • Data structures are persistent. – They don’t change – we build new ones and let the garbage collector reclaim the unused old ones. • Hence, any invariant you prove true stays true. – e.g., 3 is a member of set S. -
1 Review of Counter-Mode Encryption ¡
Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption Helger Lipmaa Phillip Rogaway Helsinki University of Technology (Finland) and University of California at Davis (USA) and University of Tartu (Estonia) Chiang Mai University (Thailand) [email protected] [email protected] http://www.tml.hut.fi/ helger http://www.cs.ucdavis.edu/ rogaway David Wagner University of California Berkeley (USA) [email protected] http://www.cs.berkeley.edu/ wagner Abstract Counter-mode encryption (“CTR mode”) was introduced by Diffie and Hellman already in 1979 [5] and is already standardized by, for example, [1, Section 6.4]. It is indeed one of the best known modes that are not standardized in [10]. We suggest that NIST, in standardizing AES modes of operation, should include CTR-mode encryption as one possibility for the next reasons. First, CTR mode has significant efficiency advantages over the standard encryption modes without weakening the security. In particular its tight security has been proven. Second, most of the perceived disadvantages of CTR mode are not valid criticisms, but rather caused by the lack of knowledge. 1 Review of Counter-Mode Encryption ¡ Notation. Let EK X ¢ denote the encipherment of an n-bit block X using key K and a block cipher E. For concreteness £ ¤ we assume that E £ AES, so n 128. If X is a nonempty string and i is a nonnegative integer, then X i denotes ¥ the ¥ X -bit string that one gets by regarding X as a nonnegative number (written in binary, most significant bit first), X ¦ ¥ ¥ adding i to this number, taking the result modulo 2 ¦ , and converting this number back into an X -bit string. -
The Method of Variable Splitting
The Method of Variable Splitting Roger Antonsen Thesis submitted to the Faculty of Mathematics and Natural Sciences at the University of Oslo for the degree of Philosophiae Doctor (PhD) Date of submission: June 30, 2008 Date of public defense: October 3, 2008 Supervisors Prof. Dr. Arild Waaler, University of Oslo Prof. Dr. Reiner H¨ahnle, Chalmers University of Technology Adjudication committee Prof. Dr. Matthias Baaz, Vienna University of Technology Prof. emer. Dr. Wolfgang Bibel, Darmstadt University of Technology Dr. Martin Giese, University of Oslo Copyright © 2008 Roger Antonsen til mine foreldre, Karin og Ingvald Table of Contents Acknowledgments vii Chapter 1 Introduction 1 1.1 Influential Ideas in Automated Reasoning2 1.2 Perspectives on Variable Splitting4 1.3 A Short History of Variable Splitting7 1.4 Delimitations and Applicability 10 1.5 Scientific Contribution 10 1.6 A Few Words of Introduction 11 1.7 Notational Conventions and Basics 12 1.8 The Contents of the Thesis 14 Chapter 2 A Tour of Rules and Inferences 15 2.1 Ground Sequent Calculus 16 2.2 Free-variable Sequent Calculus 17 2.3 Another Type of Redundancy 19 2.4 Variable-Sharing Calculi and Variable Splitting 20 Chapter 3 Preliminaries 23 3.1 Indexing 23 3.2 Indices and Indexed Formulas 24 3.3 The -relation 28 3.4 The Basic Variable-Sharing Calculus 28 3.5 Unifiers and Provability 30 3.6 Permutations 31 3.7 Conformity and Proof Invariance 35 3.8 Semantics 37 3.9 Soundness and Completeness 40 Chapter 4 Variable Splitting 41 4.1 Introductory Examples 41 4.2 Branch Names -
Constraint Microkanren in the Clp Scheme
CONSTRAINT MICROKANREN IN THE CLP SCHEME Jason Hemann Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the Department of School of Informatics, Computing, and Engineering Indiana University January 2020 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the require- ments for the degree of Doctor of Philosophy. Daniel P. Friedman, Ph.D. Amr Sabry, Ph.D. Sam Tobin-Hochstadt, Ph.D. Lawrence Moss, Ph.D. December 20, 2019 ii Copyright 2020 Jason Hemann ALL RIGHTS RESERVED iii To Mom and Dad. iv Acknowledgements I want to thank all my housemates and friends from 1017 over the years for their care and support. I’m so glad to have you all, and to have you all over the world. Who would have thought that an old house in Bloomington could beget so many great memories. While I’m thinking of it, thanks to Lisa Kamen and Bryan Rental for helping to keep a roof over our head for so many years. Me encantan mis salseros y salseras. I know what happens in the rueda stays in the rueda, so let me just say there’s nothing better for taking a break from right-brain activity. Thanks to Kosta Papanicolau for his early inspiration in math, critical thinking, and research, and to Profs. Mary Flagg and Michael Larsen for subsequent inspiration and training that helped prepare me for this work. Learning, eh?—who knew? I want to thank also my astounding undergraduate mentors including Profs. -
Development of Logic Programming: What Went Wrong, What Was Done About It, and What It Might Mean for the Future
Development of Logic Programming: What went wrong, What was done about it, and What it might mean for the future Carl Hewitt at alum.mit.edu try carlhewitt Abstract follows: A class of entities called terms is defined and a term is an expression. A sequence of expressions is an Logic Programming can be broadly defined as “using logic expression. These expressions are represented in the to deduce computational steps from existing propositions” machine by list structures [Newell and Simon 1957]. (although this is somewhat controversial). The focus of 2. Certain of these expressions may be regarded as this paper is on the development of this idea. declarative sentences in a certain logical system which Consequently, it does not treat any other associated topics will be analogous to a universal Post canonical system. related to Logic Programming such as constraints, The particular system chosen will depend on abduction, etc. programming considerations but will probably have a The idea has a long development that went through single rule of inference which will combine substitution many twists in which important questions turned out to for variables with modus ponens. The purpose of the combination is to avoid choking the machine with special have surprising answers including the following: cases of general propositions already deduced. Is computation reducible to logic? 3. There is an immediate deduction routine which when Are the laws of thought consistent? given a set of premises will deduce a set of immediate This paper describes what went wrong at various points, conclusions. Initially, the immediate deduction routine what was done about it, and what it might mean for the will simply write down all one-step consequences of the future of Logic Programming. -
Informal Proceedings of the 30Th International Workshop on Unification (UNIF 2016)
Silvio Ghilardi and Manfred Schmidt-Schauß (Eds.) Informal Proceedings of the 30th International Workshop on Unification (UNIF 2016) June 26, 2016 Porto, Portugal 1 Preface This volume contains the papers presented at UNIF 2016: The 30th International Workshop on Unification (UNIF 2016) held on June 26, 2016 in Porto. There were 10 submissions. Each submission was reviewed by at least 3, and on the average 3.3, program committee members. The committee decided to accept 8 papers for publication in these Proceedings. The program also includes 2 invited talks. The International Workshop on Unification was initiated in 1987 as a yearly forum for researchers in unification theory and related fields to meet old and new colleagues, to present recent (even unfinished) work, and to discuss new ideas and trends. It is also a good opportunity for young researchers and researchers working in related areas to get an overview of the current state of the art in unification theory. The list of previous meetings can be found at the UNIF web page: http://www.pps.univ-paris-diderot.fr/~treinen/unif/. Typically, the topics of interest include (but are not restricted to): Unification algorithms, calculi and implementations • Equational unification and unification modulo theories • Unification in modal, temporal and description logics • Admissibility of Inference Rules • Narrowing • Matching algorithms • Constraint solving • Combination problems • Disunification • Higher-Order Unification • Type checking and reconstruction • Typed unification • Complexity issues • Query answering • Implementation techniques • Applications of unification • Antiunification/Generalization • This years UNIF is a satellite event of the first International Conference on Formal Structures for Computation and Deduction (FSCD). -
Automated Reasoning
Automated Reasoning Maria Paola Bonacina Alberto Martelli Dipartimento di Informatica Dipartimento di Informatica Universita` degli Studi di Verona Universita` degli Studi di Torino A central problem in automated reasoning is to deter- automated model building. mine whether a conjecture ϕ, that represents a property to In classical first-order logic, deductive theorem proving be verified, is a logical consequence of a set S of assump- is semi-decidable, while inductive theorem proving and tions, which express properties of the object of study (e.g., model building are not even semi-decidable. It is signif- a system, a circuit, a program, a data type, a communica- icant that while books in theorem proving date from the tion protocol, a mathematical structure). early seventies [22, 48, 16, 27, 77, 44, 70], the first book A conjoint problem is that of knowledge representation, on model building appeared only recently [21]. Most ap- or finding suitable formalisms for S and ϕ to represent as- proaches to automated model building belong to one of the pects of the real world, such as action, space, time, men- following three classes, or combine their principles: tal events and commonsense reasoning. While classical logic has been the principal formalism in automated rea- 1. Enumeration methods generate interpretations and soning, and many proof techniques have been studied and test whether they are models of the given set of for- implemented, non-classical logics, such as modal, tempo- mulæ; ral, description or nonmonotonic logics, have been widely 2. Saturation methods extract models from the finite set investigated to represent knowledge. -
Lecture Notes in Computer Science 6841 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
Lecture Notes in Computer Science 6841 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany Phillip Rogaway (Ed.) Advances in Cryptology – CRYPTO 2011 31st Annual Cryptology Conference Santa Barbara, CA, USA, August 14-18, 2011 Proceedings 13 Volume Editor Phillip Rogaway University of California Department of Computer Science Davis, CA 95616, USA E-mail: [email protected] ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-22791-2 e-ISBN 978-3-642-22792-9 DOI 10.1007/978-3-642-22792-9 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2011932695 CR Subject Classification (1998): E.3, G.2.1, F.2.1-2, D.4.6, K.6.5, C.2, J.1 LNCS Sublibrary: SL 4 – Security and Cryptology © International Association for Cryptologic Research 2011 This work is subject to copyright. -
Computational Logic: Memories of the Past and Challenges for the Future
Computational Logic: Memories of the Past and Challenges for the Future John Alan Robinson Highland Institute, 96 Highland Avenue, Greenfield, MA 01301, USA. Abstract. The development of computational logic since the introduction of Frege's modern logic in 1879 is presented in some detail. The rapid growth of the field and its proliferation into a wide variety of subfields is noted and is attributed to a proliferation of subject matter rather than to a proliferation of logic itself. Logic is stable and universal, and is identified with classical first order logic. Other logics are here considered to be first order theories, syntactically sugared in notationally convenient forms. From this point of view higher order logic is essentially first order set theory. The paper ends by presenting several challenging problems which the computational logic community now faces and whose solution will shape the future of the field. 1 Introduction Although logic and computing are each very old subjects, going back very much more than a mere hundred years, it is only during the past century that they have merged and become essentially one subject. As the logican Quine wrote in 1960, "The basic notions of proof theory converge with those of machine computing. ... The utterly pure theory of mathematical proof and the utterly technological theory of machine computation are thus at bottom one, and the basic insights of each are henceforth insights of the other" ([1], p. 41). The aptly-named subject of computational logic - no pun intended - subsumes a wide variety of interests and research activities. All have something to do with both logic and computation. -
Secure Image Transferring Using Asymmetric Crypto System
Oo Khet Khet Khaing et al.; International Journal of Advance Research and Development (Volume 4, Issue 9) Available online at: www.ijarnd.com Secure image transferring using asymmetric crypto system Khet Khet Khaing Oo1, Yan Naung Soe2, Yi Mar Myint3 1,2University of Computer Studies, Myitkyina, Myanmar 3University of Computer Studies, Monywa, Myanmar ABSTRACT defined as Plain Text. The message that cannot be understood by anyone or meaningless message is what we call as Cipher Nowadays, with the growth of technology, security is an Text. Encryption is the process of converting plaintext into important issue in communication. In many applications, the ciphertext with a key. A Key is a numeric or alphanumeric text transmission of data (massage, image and so on) is needed to or maybe a special symbol. Decryption is a reverse process of provide security against from preventing unauthorized users. encryption in which original message is retrieved from the Cryptography is a technique that provides secure ciphertext. Encryption takes place at the sender end and communication. The two widely accepted and used Decryption takes place at the receiver end. cryptographic methods are symmetric and asymmetric. There are so many different techniques should be used to protect A system or product that provides encryption and decryption is confidential image data from unauthorized access. This called cryptosystem. Cryptosystem uses encryption algorithms system provides secure image transmission between sender that determine how simple or complex the encryption process and receiver. This system uses Optimal Asymmetric will be, the necessary software component, and the key Encryption Padding (OAEP) with RSA encryption algorithm (usually a long string of bits), which works with the algorithm to provide security during transmission.