A Proof Theoretic Analysis of Intruder Theories

نویسندگان

  • Alwen Tiu
  • Rajeev Goré
چکیده

We consider the decidability problem of intruder deduction in security protocol analysis, that is, deciding whether a given message M can be deduced from a set of messages Σ, under the class of convergent equational theories, modulo associativity and commutativity (AC) of certain binary operators. The traditional formulations of intruder deduction are usually given in natural-deduction-like systems. Proving decidability in these systems require significant efforts in showing that the rules are “local” in some sense. We recast the intruder deduction problem as proof search in sequent calculus, in which locality is immediate, making use of the well known translation between natural deduction and sequent calculus. Using standard proof theoretic methods, such as permutation of rules and cut elimination, we show that the intruder deduction problem can be reduced, in polynomial time, to a more elementary deduction problem, which amounts to solving certain equations in the underlying equational theories. We further show that this result extends to combination of disjoint AC-convergent theories. That is, decidability of intruder deduction under the combined theory reduces to decidability of elementary deduction problem in each constituent theory. Various researchers have reported similar results for individual cases but our work shows that they can all be obtained using a systematic and uniform methodology based on the sequent calculus.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Isabelle definitions and theorems

This document describes proofs in Isabelle of some results relevant to the paper A Proof Theoretic Analysis of Intruder Theories. It contains proofs formulated for the system for Dolev-Yao intruders considered in Section 6, although the proofs include cut-admissibility and the existence of normal derivations, which are given in the paper for more complex theories, in Sections 3 and 4. The proof...

متن کامل

Theories of proof-theoretic strength ψ(ΓΩ+1)

The purpose of this article is to present a range of theories with proof-theoretic ordinal ψ(ΓΩ+1). This ordinal parallels the ordinal of predicative analysis, Γ0, and our theories are parallel to classical theories of strength Γ0 such as ÎD<ω, FP0, ATR0, Σ1-DC0 + (SUB), and Σ1-AC0 + (SUB). We also relate these theories to the unfolding of ID1 which was already presented in the PhD thesis of th...

متن کامل

The Model-Theoretic Ordinal Analysis of Theories of Predicative Strength

We use model-theoretic methods described in [3] to obtain ordinal analyses of a number of theories of firstand second-order arithmetic, whose proof-theoretic ordinals are less than or equal to Γ0.

متن کامل

Intruder Theories (Ongoing Work)

– A finite number of processes called roles, each of which is parametrized by agent identities and consists of a sequence of name generation, the nonces and a finite sequence of rules u ⇒ v, which should be read as “upon receiving a message matching u, send the corresponding message v.” – A description of intruder capabilities, sometimes given as a proof system, which we call hereafter the offl...

متن کامل

A Proof Theoretic Analysis of Security Protocols

In this paper we define a sequent calculus to formally specify and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutabi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Logical Methods in Computer Science

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2009