30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.4. DECIDABILITY RESULTS 97<br />

Figure 4.1 System <strong>of</strong> saturation rules<br />

Input:<br />

The intruder deduction rules LI.<br />

Initialisation:<br />

Let I ′ = 〈F, LI ′, ∅〉 be the variant <strong>of</strong> the intruder deduction system I (Definition<br />

19, Chapter 2). We recall that<br />

LI ′ =<br />

�<br />

x1, . . . , xn → f(x1, . . . , xn) ∈ LI<br />

θ variant substitution <strong>of</strong> f(x1, . . . , xn)<br />

x1θ, . . . , xnθ → (f(x1, . . . , xn)θ)↓<br />

Step 1. Start with LI” = LI ′. Apply on LI” the rules below until any added rule is<br />

subsumed by a rule already present in LI”.<br />

Subsumption :<br />

Closure :<br />

Output:<br />

Output LI”.<br />

�l1 → r ∈ LI” � l2 → r ∈ LI”<br />

�<br />

LI” ← LI” \ �l2 → r<br />

�l1 → r1 ∈ LI”, t, � l2 → r2 ∈ LI”<br />

�<br />

LI” ← LI” ∪ ( � l1, � �<br />

l2 → r2)σ<br />

� � l1 ⊆ � l2<br />

t /∈ X<br />

σ = mgu ∅(r1, t)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!