A proof theoretic analysis of intruder theories

Computer Science – Logic in Computer Science

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

This is an extended version of a conference paper accepted to RTA 2009

Scientific paper

We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message $M$ can be deduced from a set of messages $\Gamma$ under the theory of blind signatures and arbitrary convergent equational theories modulo associativity and commutativity (AC) of certain binary operators. The traditional formulations of intruder deduction are usually given in natural-deduction-like systems and proving decidability requires significant effort in showing that the rules are "local" in some sense. By using the well-known translation between natural deduction and sequent calculus, we recast the intruder deduction problem as proof search in sequent calculus, in which locality is immediate. Using standard proof theoretic methods, such as permutability of rules and cut elimination, we show that the intruder deduction problem can be reduced, in polynomial time, to the elementary deduction problems, which amounts to solving certain equations in the underlying individual equational theories. We further show that this result extends to combinations of disjoint AC-convergent theories whereby the decidability of intruder deduction under the combined theory reduces to the decidability of elementary deduction in each constituent theory. Although various researchers have reported similar results for individual cases, our work shows that these results can be obtained using a systematic and uniform methodology based on the sequent calculus.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

A proof theoretic analysis of intruder theories does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with A proof theoretic analysis of intruder theories, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A proof theoretic analysis of intruder theories will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-389313

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.