Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
140 CHAPTER 5. SATURATED DEDUCTION SYSTEMS<br />
plication <strong>of</strong> Bl(x, y), y → x then the application <strong>of</strong> x, y → sig(x, y). Let d ′ be<br />
the obtained derivation, d ′ : E → . . . → Ei →Bl(x,y),y→x Ei, xσ →x,y→sig(x,y)<br />
Ei, xσ, sig(x, Sk(z))σ → . . . → En−1, t. By above <strong>and</strong> since xσ /∈ Ei we have<br />
either Bl(x, y)σ ∈ E or Bl(x, y)σ is obtained by a former decreasing rule.<br />
If xσ ∈ Ei then the rule applied at step i in d can be replaced by the application<br />
<strong>of</strong> x, y → sig(x, y). Let d ′′ be the obtained derivation, d ′′ : E → . . . →<br />
Ei →x,y→sig(x,y) Ei, sig(x, Sk(z))σ → . . . → En−1, t.<br />
This implies that each bad application <strong>of</strong> the rule sig(Bl(x, y), Sk(z)), y →<br />
sig(x, Sk(z)) can be replaced by one (or two) well-applied rules. We deduce that<br />
if the derivation D is not well-formed there is another well-formed derivation<br />
D ′′ starting from E <strong>of</strong> goal t such that Cons(D) ⊆ Cons(D ′′ ). �<br />
We recall that I0 = 〈FBS, TI0, HBS〉 <strong>and</strong> I ′ = 〈FBS, LI ′, ∅〉. We recall also<br />
that HBS has the finite variant property. The construction <strong>of</strong> I ′ <strong>and</strong> Lemma<br />
52 implies that the conditions V ariant, SOL1 <strong>and</strong> SOL2 from Definition 52 are<br />
satisfied, <strong>and</strong> hence we conclude that I ′ is I0-strongly order local.<br />
In order to solve I0-ground reachability problems, we apply the algorithm<br />
defined in section 5.4. Since L ′ I is finite <strong>and</strong> I′ is I0-strongly order local, by<br />
lemmas (43, 44, 46, 47 <strong>and</strong> 48) we deduce the following theorem:<br />
Theorem 13 The I0-ground reachability problem is decidable.<br />
5.8 Decidability <strong>of</strong> reachability problems for subterm convergent<br />
theories<br />
In this section, we give a decidability result for the reachability problems for<br />
a class <strong>of</strong> subterm convergent equational theories. We recall that subterm convergent<br />
equational theories have finite variant property [86]. The result <strong>of</strong> this<br />
section is entailed by a more general result by Baudet [31], but the pro<strong>of</strong> here in<br />
this specific case is much shorter.<br />
We recall that F is a set <strong>of</strong> functions symbols <strong>and</strong> we denote by H a subterm<br />
convergent equational theory <strong>and</strong> by I0 = 〈F, L0, H〉 the initial deduction system<br />
such that L0 is the union <strong>of</strong> functions x1, . . . , xn → f(x1, . . . , xn) for some<br />
function symbols f ∈ F.<br />
Definition 54 (Subterm convergent theories.) An equational theory H is subterm<br />
convergent if it is generated by a convergent rewriting system R <strong>and</strong> for each rule<br />
l → r ∈ R, r is a strict subterm <strong>of</strong> l.<br />
In the rest <strong>of</strong> this section, we give an algorithm to decide the following reachability<br />
problem, “I0-Reachability Problem”:<br />
Input: An I0-constraint system C.