• Top
    • Documentation
    • Books
    • Boolean-reasoning
    • Projects
    • Debugging
    • Community
    • Std
    • Proof-automation
    • Macro-libraries
    • ACL2
    • Interfacing-tools
    • Hardware-verification
    • Software-verification
      • Kestrel-books
        • Crypto-hdwallet
        • Apt
        • Error-checking
        • Fty-extensions
        • Isar
        • Kestrel-utilities
        • Set
        • C
        • Soft
        • Bv
        • Imp-language
        • Ethereum
        • Event-macros
        • Java
        • Riscv
        • Bitcoin
          • Bip32
            • Bip32-wallet-structure
            • Bip32-key-trees
            • Bip32-key-serialization
            • Bip32-key-derivation
            • Bip32-executable-attachments
              • Bip32-path-set-closedp-executable-attachment
              • Bip32-valid-keys-p-executable-attachment
                • Bip32-valid-keys-p-exec
                • Bip32-valid-keys-p-exec-correctness
                • Bip32-valid-keys-p-exec-attach
                • Bip32-valid-depths-p-executable-attachment
              • Bip32-extended-keys
              • Bip32-master-key-generation
            • Bech32
            • Bip39
            • Bip44
            • Base58
            • Bip43
            • Bytes
            • Base58check
            • Cryptography
            • Bip-350
            • Bip-173
          • Zcash
          • Yul
          • ACL2-programming-language
          • Prime-fields
          • Json
          • Syntheto
          • File-io-light
          • Cryptography
          • Number-theory
          • Axe
          • Lists-light
          • Builtins
          • Solidity
          • Helpers
          • Htclient
          • Typed-lists-light
          • Arithmetic-light
        • X86isa
        • Axe
        • Execloader
      • Math
      • Testing-utilities
    • Bip32-valid-keys-p-executable-attachment

    Bip32-valid-keys-p-exec-attach

    Attachment of bip32-valid-keys-p-exec to bip32-valid-keys-p.

    The fact that the executable function satisfies all the constraints of the non-executable one follows from their equivalence.

    We prove two of the constraints as separate theorems. Attempts at proving the attachment directly fail.

    Definitions and Theorems

    Theorem: bip32-valid-keys-p-exec-constraint1

    (defthm bip32-valid-keys-p-exec-constraint1
      (equal (bip32-valid-keys-p-exec root paths)
             (let ((path (bip32-valid-keys-p-witness root paths)))
               (implies (in path (bip32-path-sfix paths))
                        (not (mv-nth 0 (bip32-ckd* root path)))))))

    Theorem: bip32-valid-keys-p-exec-constraint2

    (defthm bip32-valid-keys-p-exec-constraint2
      (implies (bip32-valid-keys-p-exec root paths)
               (implies (in path (bip32-path-sfix paths))
                        (not (mv-nth 0 (bip32-ckd* root path))))))