30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.5. CONCLUSION 109<br />

In the next chapter, we generalise this decidability result to the class <strong>of</strong><br />

cryptographic protocols that use cryptographic primitives represented by equational<br />

theories generated by convergent rewrite systems having the finite variant<br />

property. That decidability result is obtained by generalising the pro<strong>of</strong>s <strong>of</strong><br />

this chapter: we show that the termination <strong>of</strong> the saturation is sufficient to obtain<br />

the decidability <strong>of</strong> the ground reachability problems, <strong>and</strong> we add another<br />

condition to obtain the decidability <strong>of</strong> the non ground reachability problems.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!