2009
DOI: 10.1007/978-3-642-02138-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Epistemic Logic for the Applied Pi Calculus

Abstract: Abstract. We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the security guarantees are usually stated as equivalences. While process calculi provide a natural means to describe the protocols themselves, epistemic logics are often better suited for expressing certain security properties such as secrecy and anonymity.We intend to bridge the gap between these two approaches: using the set of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 25 publications
0
24
0
Order By: Relevance
“…In this paper, we decided to focus on the detectability constraint because it has received less attention so far, but the possibility for an actor to know a given information (beyond the fact that he may receive or not a given set of variables) is obviously at the heart of privacy protection. Inference systems to prove knowledge properties (akin to epistemic logic [6,10,41]) can be defined independently of the detectability system introduced in Section 3 and used to check additional constraints. Such an inference system typically includes rules to prove that, from a given set of knowledge, an actor can derive a new knowledge.…”
Section: Discussion and Further Workmentioning
confidence: 99%
“…In this paper, we decided to focus on the detectability constraint because it has received less attention so far, but the possibility for an actor to know a given information (beyond the fact that he may receive or not a given set of variables) is obviously at the heart of privacy protection. Inference systems to prove knowledge properties (akin to epistemic logic [6,10,41]) can be defined independently of the detectability system introduced in Section 3 and used to check additional constraints. Such an inference system typically includes rules to prove that, from a given set of knowledge, an actor can derive a new knowledge.…”
Section: Discussion and Further Workmentioning
confidence: 99%
“…The BAN logic [5], proposed by Burrows, Abadi and Needham, is a notable example of epistemic logic used to model and verify the authentication in cryptographic protocols. To improve the formalization of protocols' behaviours, some epistemic approaches integrate process calculi [23,10,7].…”
Section: Related Workmentioning
confidence: 99%
“…Epistemic logic for process calculi has been discussed in [7,9,14]. In all of these works, however, the epistemic logic is defined outside of the process calculus, with the processes as models for the logic, whereas our processes have epistemic (or spatial) logic terms within the constraint system, as well as knowledge or space constructions on the processes.…”
Section: Compact Approximation Of Space and Knowledgementioning
confidence: 99%