30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

140 CHAPTER 5. SATURATED DEDUCTION SYSTEMS<br />

plication <strong>of</strong> Bl(x, y), y → x then the application <strong>of</strong> x, y → sig(x, y). Let d ′ be<br />

the obtained derivation, d ′ : E → . . . → Ei →Bl(x,y),y→x Ei, xσ →x,y→sig(x,y)<br />

Ei, xσ, sig(x, Sk(z))σ → . . . → En−1, t. By above <strong>and</strong> since xσ /∈ Ei we have<br />

either Bl(x, y)σ ∈ E or Bl(x, y)σ is obtained by a former decreasing rule.<br />

If xσ ∈ Ei then the rule applied at step i in d can be replaced by the application<br />

<strong>of</strong> x, y → sig(x, y). Let d ′′ be the obtained derivation, d ′′ : E → . . . →<br />

Ei →x,y→sig(x,y) Ei, sig(x, Sk(z))σ → . . . → En−1, t.<br />

This implies that each bad application <strong>of</strong> the rule sig(Bl(x, y), Sk(z)), y →<br />

sig(x, Sk(z)) can be replaced by one (or two) well-applied rules. We deduce that<br />

if the derivation D is not well-formed there is another well-formed derivation<br />

D ′′ starting from E <strong>of</strong> goal t such that Cons(D) ⊆ Cons(D ′′ ). �<br />

We recall that I0 = 〈FBS, TI0, HBS〉 <strong>and</strong> I ′ = 〈FBS, LI ′, ∅〉. We recall also<br />

that HBS has the finite variant property. The construction <strong>of</strong> I ′ <strong>and</strong> Lemma<br />

52 implies that the conditions V ariant, SOL1 <strong>and</strong> SOL2 from Definition 52 are<br />

satisfied, <strong>and</strong> hence we conclude that I ′ is I0-strongly order local.<br />

In order to solve I0-ground reachability problems, we apply the algorithm<br />

defined in section 5.4. Since L ′ I is finite <strong>and</strong> I′ is I0-strongly order local, by<br />

lemmas (43, 44, 46, 47 <strong>and</strong> 48) we deduce the following theorem:<br />

Theorem 13 The I0-ground reachability problem is decidable.<br />

5.8 Decidability <strong>of</strong> reachability problems for subterm convergent<br />

theories<br />

In this section, we give a decidability result for the reachability problems for<br />

a class <strong>of</strong> subterm convergent equational theories. We recall that subterm convergent<br />

equational theories have finite variant property [86]. The result <strong>of</strong> this<br />

section is entailed by a more general result by Baudet [31], but the pro<strong>of</strong> here in<br />

this specific case is much shorter.<br />

We recall that F is a set <strong>of</strong> functions symbols <strong>and</strong> we denote by H a subterm<br />

convergent equational theory <strong>and</strong> by I0 = 〈F, L0, H〉 the initial deduction system<br />

such that L0 is the union <strong>of</strong> functions x1, . . . , xn → f(x1, . . . , xn) for some<br />

function symbols f ∈ F.<br />

Definition 54 (Subterm convergent theories.) An equational theory H is subterm<br />

convergent if it is generated by a convergent rewriting system R <strong>and</strong> for each rule<br />

l → r ∈ R, r is a strict subterm <strong>of</strong> l.<br />

In the rest <strong>of</strong> this section, we give an algorithm to decide the following reachability<br />

problem, “I0-Reachability Problem”:<br />

Input: An I0-constraint system C.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!