Skip to main content

Revisiting the Epistemics of Protocol Correctness

  • Conference paper
Advances in Artificial Intelligence (Canadian AI 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7884))

Included in the following conference series:

Abstract

Formal logics of knowledge have been employed for the verification of cryptographic protocols. Intuitively, the idea is that a correct run of a protocol should lead the participating agents to “know” some facts, due to the structure of the protocol. While there has been a great deal of work in this area, fundamental questions remain regarding the foundations of the approach. In fact, it is not even clear if any intrinsic properties of knowledge are actually required; in most cases the relevant notion of knowledge reduces directly to universal quantification over protocol runs. Moreover, there is no consensus about the appropriate epistemic domain for protocol participants, the nature of epistemic change, or the significance of initial knowledge. In this paper, we address these fundamental questions by revisiting the epistemic foundations of protocol verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agray, N., van der Hoek, W., de Vink, E.: On BAN logics for industrial security protocols. In: Dunin-Keplicz, B., Nawarecki, E. (eds.) CEEMAS 2001. LNCS (LNAI), vol. 2296, pp. 29–36. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Article  Google Scholar 

  3. Carlucci Aiello, L., Massacci, F.: Verifying Security Protocols as Planning in Logic Programming. ACM Transactions on Computational Logic 2(4), 542–580 (2001)

    Article  MathSciNet  Google Scholar 

  4. Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Dechesne, F., Mousavi, M.R., Orzan, S.: Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol. 4790, pp. 226–241. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory 2(29), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  7. Fagin, R., Halpern, J., Moses, Y., Vardi, M.: Reasoning About Knowledge. MIT Press (1995)

    Google Scholar 

  8. Gong, L., Needham, R., Yahalom, R.: Reasoning About Belief in Cryptographic Protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234–248 (1990)

    Google Scholar 

  9. Guttman, J., Thayer, J.: Authentication tests. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  10. Halpern, J., Pucella, R.: On the relationship between strand spaces and multi-agent systems. ACM Transactions on Information and System Security (TISSEC) 6(1) (2003)

    Google Scholar 

  11. Hunter, A., Delgrande, J.P.: Belief Change and Cryptographic Protocol Verification. In: Proceedings of the National Conference on Artificial Intelligence, AAAI 2007 (2007)

    Google Scholar 

  12. Hunter, A.: Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds.) EuroISI 2008. LNCS, vol. 5376, pp. 61–72. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  13. Kramer, S.: Reducing Provability to Knowledge in Multi-Agent Systems. In: Intuitionistic Modal Logics and Applications Workshop, IMLA 2008 (2008)

    Google Scholar 

  14. Syverson, P.: Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Compuer Security 1, 317–334 (1992)

    Google Scholar 

  15. Syverson, P., Cervesato, I.: The logic of authentication protocols. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 63–137. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hunter, A. (2013). Revisiting the Epistemics of Protocol Correctness. In: Zaïane, O.R., Zilles, S. (eds) Advances in Artificial Intelligence. Canadian AI 2013. Lecture Notes in Computer Science(), vol 7884. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38457-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38457-8_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38456-1

  • Online ISBN: 978-3-642-38457-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics