Abstract
Formal logics of knowledge have been employed for the verification of cryptographic protocols. Intuitively, the idea is that a correct run of a protocol should lead the participating agents to “know” some facts, due to the structure of the protocol. While there has been a great deal of work in this area, fundamental questions remain regarding the foundations of the approach. In fact, it is not even clear if any intrinsic properties of knowledge are actually required; in most cases the relevant notion of knowledge reduces directly to universal quantification over protocol runs. Moreover, there is no consensus about the appropriate epistemic domain for protocol participants, the nature of epistemic change, or the significance of initial knowledge. In this paper, we address these fundamental questions by revisiting the epistemic foundations of protocol verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agray, N., van der Hoek, W., de Vink, E.: On BAN logics for industrial security protocols. In: Dunin-Keplicz, B., Nawarecki, E. (eds.) CEEMAS 2001. LNCS (LNAI), vol. 2296, pp. 29–36. Springer, Heidelberg (2002)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
Carlucci Aiello, L., Massacci, F.: Verifying Security Protocols as Planning in Logic Programming. ACM Transactions on Computational Logic 2(4), 542–580 (2001)
Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)
Dechesne, F., Mousavi, M.R., Orzan, S.: Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol. 4790, pp. 226–241. Springer, Heidelberg (2007)
Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Transactions on Information Theory 2(29), 198–208 (1983)
Fagin, R., Halpern, J., Moses, Y., Vardi, M.: Reasoning About Knowledge. MIT Press (1995)
Gong, L., Needham, R., Yahalom, R.: Reasoning About Belief in Cryptographic Protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234–248 (1990)
Guttman, J., Thayer, J.: Authentication tests. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000)
Halpern, J., Pucella, R.: On the relationship between strand spaces and multi-agent systems. ACM Transactions on Information and System Security (TISSEC) 6(1) (2003)
Hunter, A., Delgrande, J.P.: Belief Change and Cryptographic Protocol Verification. In: Proceedings of the National Conference on Artificial Intelligence, AAAI 2007 (2007)
Hunter, A.: Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary. In: Ortiz-Arroyo, D., Larsen, H.L., Zeng, D.D., Hicks, D., Wagner, G. (eds.) EuroISI 2008. LNCS, vol. 5376, pp. 61–72. Springer, Heidelberg (2008)
Kramer, S.: Reducing Provability to Knowledge in Multi-Agent Systems. In: Intuitionistic Modal Logics and Applications Workshop, IMLA 2008 (2008)
Syverson, P.: Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. Journal of Compuer Security 1, 317–334 (1992)
Syverson, P., Cervesato, I.: The logic of authentication protocols. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 63–137. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hunter, A. (2013). Revisiting the Epistemics of Protocol Correctness. In: Zaïane, O.R., Zilles, S. (eds) Advances in Artificial Intelligence. Canadian AI 2013. Lecture Notes in Computer Science(), vol 7884. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38457-8_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-38457-8_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38456-1
Online ISBN: 978-3-642-38457-8
eBook Packages: Computer ScienceComputer Science (R0)