A Proof Theoretic Analysis of Intruder Theories
نویسندگان
چکیده
We consider the decidability problem of intruder deduction in security protocol analysis, that is, deciding whether a given message M can be deduced from a set of messages Σ, under the class of convergent equational theories, modulo associativity and commutativity (AC) of certain binary operators. The traditional formulations of intruder deduction are usually given in natural-deduction-like systems. Proving decidability in these systems require significant efforts in showing that the rules are “local” in some sense. We recast the intruder deduction problem as proof search in sequent calculus, in which locality is immediate, making use of the well known translation between natural deduction and sequent calculus. Using standard proof theoretic methods, such as permutation of rules and cut elimination, we show that the intruder deduction problem can be reduced, in polynomial time, to a more elementary deduction problem, which amounts to solving certain equations in the underlying equational theories. We further show that this result extends to combination of disjoint AC-convergent theories. That is, decidability of intruder deduction under the combined theory reduces to decidability of elementary deduction problem in each constituent theory. Various researchers have reported similar results for individual cases but our work shows that they can all be obtained using a systematic and uniform methodology based on the sequent calculus.
منابع مشابه
A Isabelle definitions and theorems
This document describes proofs in Isabelle of some results relevant to the paper A Proof Theoretic Analysis of Intruder Theories. It contains proofs formulated for the system for Dolev-Yao intruders considered in Section 6, although the proofs include cut-admissibility and the existence of normal derivations, which are given in the paper for more complex theories, in Sections 3 and 4. The proof...
متن کاملTheories of proof-theoretic strength ψ(ΓΩ+1)
The purpose of this article is to present a range of theories with proof-theoretic ordinal ψ(ΓΩ+1). This ordinal parallels the ordinal of predicative analysis, Γ0, and our theories are parallel to classical theories of strength Γ0 such as ÎD<ω, FP0, ATR0, Σ1-DC0 + (SUB), and Σ1-AC0 + (SUB). We also relate these theories to the unfolding of ID1 which was already presented in the PhD thesis of th...
متن کاملThe Model-Theoretic Ordinal Analysis of Theories of Predicative Strength
We use model-theoretic methods described in [3] to obtain ordinal analyses of a number of theories of firstand second-order arithmetic, whose proof-theoretic ordinals are less than or equal to Γ0.
متن کاملIntruder Theories (Ongoing Work)
– A finite number of processes called roles, each of which is parametrized by agent identities and consists of a sequence of name generation, the nonces and a finite sequence of rules u ⇒ v, which should be read as “upon receiving a message matching u, send the corresponding message v.” – A description of intruder capabilities, sometimes given as a proof system, which we call hereafter the offl...
متن کاملA Proof Theoretic Analysis of Security Protocols
In this paper we define a sequent calculus to formally specify and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutabi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Logical Methods in Computer Science
دوره 6 شماره
صفحات -
تاریخ انتشار 2009