30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.10. CONCLUSION 145<br />

syntactic conditions on the intruder deduction rules, this result is incomparable<br />

with ours.<br />

5.10 Conclusion<br />

In [80], H. Comon-Lundh proposes a two-steps strategy for solving general<br />

reachability problems: first, decide ground reachability problems <strong>and</strong>, second,<br />

reduce general reachability problems to ground reachability ones, e.g. by providing<br />

a bound on the size <strong>of</strong> a minimal solution <strong>of</strong> a problem. Our results<br />

are in this line: for contracting deduction systems, general reachability can be<br />

reduced to ground reachability. We strongly conjecture that it permits one to<br />

provide a bound on the size <strong>of</strong> minimal solutions. Thus, this chapter adds a<br />

new criterion to the one already known for deciding reachability problems. In<br />

future works, we will investigate how the construction presented here can be<br />

extended to equational theories having the finite variant property w.r.t. a nonempty<br />

equational theory. We will also try to weaken the definition <strong>of</strong> µ(T ) for<br />

a set <strong>of</strong> terms T . In the next chapter, we employ similar techniques to solve<br />

ground entailment problems for saturated first-order theories.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!