• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Symbolic Model Checking the Knowledge of the Dining Cryptographers (2002)

by Ron Van Der Meyden, Kaile Su
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 64
Next 10 →

Anonymity and Information Hiding in Multiagent Systems

by Joseph Y. Halpern, Kevin R. O'Neill , 2003
"... We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework, much in the spirit of our earlier work on secrecy ..."
Abstract - Cited by 94 (3 self) - Add to MetaCart
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework, much in the spirit of our earlier work on secrecy [9]. We give several definitions of anonymity with respect to agents, actions, and observers in multiagent systems, and we relate our definitions of anonymity to other definitions of information hiding, such as secrecy. We also give probabilistic definitions of anonymity that are able to quantify an observer's uncertainty about the state of the system. Finally, we relate our definitions of anonymity to other formalizations of anonymity and information hiding, including definitions of anonymity in the process algebra CSP and definitions of information hiding using function views.

Automatic verification of multi-agent systems by model checking via ordered binary decision diagrams

by Franco Raimondi, Alessio Lomuscio - Journal of Applied Logic
"... checking via ordered binary decision diagrams ..."
Abstract - Cited by 53 (27 self) - Add to MetaCart
checking via ordered binary decision diagrams
(Show Context)

Citation Context

...of the fault under consideration. 5.2 The protocol of the dining cryptographers The protocol of the dining cryptographers was introduced in [19], and model checking of its properties was discussed in =-=[20]-=-. We report the original wording from [19]. “Three cryptographers are sitting down to dinner at their favourite three-star restaurant. Their waiter informs them that arrangements have been made with t...

Measuring anonymity with relative entropy

by Yuxin Deng, Jun Pang, Peng Wu - In Proceedings of the 4th International Workshop on Formal Aspects in Security and Trust, volume 4691 of LNCS , 2007
"... Abstract. Anonymity is the property of maintaining secret the identity of users performing a certain action. Anonymity protocols often use random mechanisms which can be described probabilistically. In this paper, we propose a probabilistic process calculus to describe protocols for ensuring anonymi ..."
Abstract - Cited by 21 (2 self) - Add to MetaCart
Abstract. Anonymity is the property of maintaining secret the identity of users performing a certain action. Anonymity protocols often use random mechanisms which can be described probabilistically. In this paper, we propose a probabilistic process calculus to describe protocols for ensuring anonymity, and we use the notion of relative entropy from information theory to measure the degree of anonymity these protocols can guarantee. Furthermore, we prove that the operators in the probabilistic process calculus are non-expansive, with respect to this measuring method. We illustrate our approach by using the example of the Dining Cryptographers Problem. 1
(Show Context)

Citation Context

...stic CCS are non-expansive. We havesdemonstrated our approach by using the example of the Dining Cryptographers Problem. Model checking anonymity protocols in the logic of knowledge was considered in =-=[27]-=-. It would also be interesting to investigate the problem in a probabilistic setting. The probabilistic model checker PRISM [17] was used to find novel attacks on Crowds [25], and to analyse cascase n...

MCK: Model checking the logic of knowledge

by Peter Gammie, Ron Van Der Meyden - Proceedings of CAV-2004, Lecture Notes in Computer Science , 2004
"... Introduction: The specification formalism employed in model checking is usually some flavour of temporal or process algebraic language that expresses properties of the behavioural aspects of a system. Knowledge [5] is a modality that is orthogonal to the behavioural dimension, capturing properties o ..."
Abstract - Cited by 20 (3 self) - Add to MetaCart
Introduction: The specification formalism employed in model checking is usually some flavour of temporal or process algebraic language that expresses properties of the behavioural aspects of a system. Knowledge [5] is a modality that is orthogonal to the behavioural dimension, capturing properties of information flow. Logics of knowledge have been shown to be a useful framework for the
(Show Context)

Citation Context

...nous perfect recall semantics requires a function that maps a fixed, finite sequence of observations to the set of final states of traces consistent with this sequence of observations, as detailed in =-=[10]-=-. The system is implemented in Haskell, and relies on David Long’s BDD package, implemented in C, for efficient BDD operations. Related Work: While other systems in recent years have implemented model...

On Epistemic Temporal Strategic Logic

by Sieuwert Van Otterloo, Geert Jonker - In Proceedings of LCMAS , 2004
"... Abstract. ATEL is one of the most expressive logics for reasoning about knowledge, time and strategies. Several issues around the interpretation of this logic are still unresolved. This paper contributes to the ongoing discussion by showing that agents do not have to know a specific strategy for doi ..."
Abstract - Cited by 19 (1 self) - Add to MetaCart
Abstract. ATEL is one of the most expressive logics for reasoning about knowledge, time and strategies. Several issues around the interpretation of this logic are still unresolved. This paper contributes to the ongoing discussion by showing that agents do not have to know a specific strategy for doing something in order to have a capability. Furthermore we claim that agents can possess so-called strategic knowledge that is derived from their knowledge of strategies being played. In order to prove these claims we present an alternative interpretation of ATEL over extensive game forms. For the definition of abilities we use strategy domination, and to deal with strategic knowledge we include strategy profiles in the model. We illustrate the interpretation issues mentioned using several small examples. Furthermore we show how perfect recall and perfect memory can be characterized. 1

A Strategic Analysis of Multi-agent Protocols

by Sieuwert van Otterloo , 2005
"... ..."
Abstract - Cited by 15 (1 self) - Add to MetaCart
Abstract not found

Automatic verification of knowledge and time with NuSMV

by Alessio Lomuscio, Charles Pecheur, Franco Raimondi - In Proceedings of the Twentieth International Joint Conference on Artificial Intelligence , 2007
"... We show that the problem of model checking multidimensional modal logics can be reduced to the problem of model checking ARCTL, an extension of the temporal logic CTL with action labels and operators to reason about actions. In particular, we introduce a methodology for model checking a temporal-epi ..."
Abstract - Cited by 15 (4 self) - Add to MetaCart
We show that the problem of model checking multidimensional modal logics can be reduced to the problem of model checking ARCTL, an extension of the temporal logic CTL with action labels and operators to reason about actions. In particular, we introduce a methodology for model checking a temporal-epistemic logic by building upon an extension of the model checker NuSMV that enables the verification of ARCTL. We briefly present the implementation and report experimental results for the verification of a typical security protocol involving temporal-epistemic properties: the protocol of the dining cryptographers. 1

A framework for automatically checking anonymity with µCRL,” in

by T Chothia , S M Orzan , J Pang , M Torabi Dashti - Proc. 2nd Symposium on Trustworthy Global Computing, ser. LNCS, , 2007
"... Abstract. We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder ..."
Abstract - Cited by 15 (8 self) - Add to MetaCart
Abstract. We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a protocol specification in μCRL, by using a combination of dedicated tools and existing state-of-the-art μCRL tools. To illustrate the flexibility of our method we test the Dining Cryptographers problem and the FOO 92 voting protocol. Our definitions of anonymity provide an accurate picture of the different ways that anonymity can break down, due for instance to coallitions of inside intruders. Our calculations can be performed on a cluster of machines, allowing us to check protocols for large numbers of participants.
(Show Context)

Citation Context

...ms are specific to the general verification method of writing process specifications and then model checking temporal properties on the generated behaviour model. Approaches based on epistemic logics =-=[24, 11]-=- are able to express anonymity more naturally and do allow its verification by model checking, but they encounter other, mainly modelling, problems and are not supported by such powerful tools as we u...

A Symmetry Reduction Technique for Model Checking Temporal-Epistemic Logic

by Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Qu
"... We introduce a symmetry reduction technique for model checking temporal-epistemic properties of multi-agent systems defined in the mainstream interpreted systems framework. The technique, based on counterpart semantics, aims to reduce the set of initial states that need to be considered in a model. ..."
Abstract - Cited by 14 (7 self) - Add to MetaCart
We introduce a symmetry reduction technique for model checking temporal-epistemic properties of multi-agent systems defined in the mainstream interpreted systems framework. The technique, based on counterpart semantics, aims to reduce the set of initial states that need to be considered in a model. We present theoretical results establishing that there are neither false positives nor false negatives in the reduced model. We evaluate the technique by presenting the results of an implementation tested against two well known applications of epistemic logic, the muddy children and the dining cryptographers. The experimental results obtained confirm that the reduction in model checking time can be dramatic, thereby allowing for the verification of hitherto intractable systems. 1

Automatic Verification of Deontic Interpreted Systems by Model Checking via OBDD's

by Franco Raimondi, Alessio Lomuscio , 2004
"... We present an algorithm for the verification of multiagent systems specified by means of a modal logic that includes a temporal, an epistemic, and a deontic operator. Verification is performed by model checking on OBDD's. We present an implementation of the algorithm and report on experimental ..."
Abstract - Cited by 13 (2 self) - Add to MetaCart
We present an algorithm for the verification of multiagent systems specified by means of a modal logic that includes a temporal, an epistemic, and a deontic operator. Verification is performed by model checking on OBDD's. We present an implementation of the algorithm and report on experimental results for the bit transmission problem with faults.
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University