Tree automata with one memory, set constraints, and ping-pong protocols

被引:0
|
作者
Comon, H
Cortier, V
Mitchell, J
机构
[1] Stanford Univ, Dept Comp Sci, Stanford, CA 94305 USA
[2] Ecole Normale Super, Cachan, France
[3] CNRS, Lab Specificat & Verificat, Cachan, France
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We introduce a class of tree automata that perform tests on a memory that is updated using function symbol application and projection. The language emptiness problem for this class of tree automata is shown to be in DEXPTIME. We also introduce a class of set constraints with equality tests and prove its decidability by completion techniques and a reduction to tree automata with one memory. Set constraints with equality tests may be used to decide secrecy for a class of cryptographic protocols that properly contains a class of memoryless "ping-pong protocols" introduced by Dolev and Yao.
引用
收藏
页码:682 / 693
页数:12
相关论文
共 29 条
  • [1] Tree automata with one memory set constraints and cryptographic protocols
    Comon, H
    Cortier, W
    THEORETICAL COMPUTER SCIENCE, 2005, 331 (01) : 143 - 214
  • [2] ON THE SECURITY OF PING-PONG PROTOCOLS
    DOLEV, D
    EVEN, S
    KARP, RM
    INFORMATION AND CONTROL, 1982, 55 (1-3): : 57 - 68
  • [3] Decidability Issues for Extended Ping-Pong Protocols
    Hans Hüttel
    Jiří Srba
    Journal of Automated Reasoning, 2006, 36 : 125 - 147
  • [4] Decidability issues for extended ping-pong protocols
    Huettel, Hans
    Srba, Jiri
    JOURNAL OF AUTOMATED REASONING, 2006, 36 (1-2) : 125 - 147
  • [5] Decidability issues for extended ping-pong protocols
    Hüttel, Hans
    Srba, Jiří
    Journal of Automated Reasoning, 2006, 36 (1-2): : 125 - 147
  • [6] DERIVATION OF RATE EQUATIONS FOR MULTISITE PING-PONG MECHANISMS WITH PING-PONG REACTIONS AT ONE OR MORE SITES
    CLELAND, WW
    JOURNAL OF BIOLOGICAL CHEMISTRY, 1973, 248 (24) : 8353 - 8355
  • [7] Monotonic set-extended prefix rewriting and verification of recursive ping-pong protocols
    Delzanno, Giorgio
    Esparza, Javier
    Srba, Jiri
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2006, 4218 : 415 - 429
  • [8] An Experiment in Ping-Pong Protocol Verification by Nondeterministic Pushdown Automata
    Glueck, Robert
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2018, (268): : 169 - 184
  • [9] Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm
    Wahyudi, Erwin Eko
    Pulungan, Reza
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 293 - 298
  • [10] ON THE SECURITY OF PING-PONG PROTOCOLS WHEN IMPLEMENTED USING THE RSA
    EVEN, S
    GOLDREICH, O
    SHAMIR, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 58 - 72