2012
DOI: 10.1007/978-3-642-28762-6_19
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Cryptographic Keys in Dynamic Epistemic Logic with DEMO

Abstract: It is far from obvious to find logical counterparts to crytographic protocol primitives. In logic, a common assumption is that agents are perfectly rational and have no computational limitations. This creates a dilemma. If one merely abstracts from computational aspects, protocols become trivial and the difference between tractable and intractable computation, surely an essential feature of protocols, disappears. This way, the protocol gets lost. On the other hand, if one 'merely' (scare quotes indeed) models … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…The authors of [3] proposed a method that uses abstract data and deductive rules to prove the results of model checkers. Hans van Ditmarsch et al [7] developed a dynamic epistemic model checker. In the follow-up work (e.g., [7,35,36]), many researchers verified and analyzed security protocols with dynamic epistemic logic.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors of [3] proposed a method that uses abstract data and deductive rules to prove the results of model checkers. Hans van Ditmarsch et al [7] developed a dynamic epistemic model checker. In the follow-up work (e.g., [7,35,36]), many researchers verified and analyzed security protocols with dynamic epistemic logic.…”
Section: Related Workmentioning
confidence: 99%
“…Hans van Ditmarsch et al [7] developed a dynamic epistemic model checker. In the follow-up work (e.g., [7,35,36]), many researchers verified and analyzed security protocols with dynamic epistemic logic. The authors of [37] proposed a variant of epistemic logic methods to verify authentication protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The correctness of the solution has been established, for all k ∈ N using induction, by informal mathematical proof [16] and by mathematical proofs about a formalisation in a Hilbert calculus [34]. It has also been automatically verified, for small values of k, using techniques from model checking [29] (see also [40] for related work) and automated theorem proving [15,39].…”
Section: Case Study: the Muddy Children Puzzlementioning
confidence: 99%
“…(It is more common in cryptography, however, to use the random oracle model [12], in which the random function represents a hash function rather than an encryption function, and to use this as the basis for the construction of ciphers.) Van Ditmarsch et al [47] use a similar idea, but their approach is purely epistemic and they do not have probability in their models. The connections that we draw to BAN logic are not developed in this work.…”
Section: Related Workmentioning
confidence: 99%