A Proof Theoretic Analysis of Intruder Theories

We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages Gamma under the theory of blind signatures and arbitrary convergent equational theories modulo associativity and commutativity (AC) of certai...

Full description

Bibliographic Details
Main Authors: Alwen F Tiu, Rajeev Gore, Jeremy Dawson
Format: Article
Language:English
Published: Logical Methods in Computer Science e.V. 2010-09-01
Series:Logical Methods in Computer Science
Subjects:
Online Access:https://lmcs.episciences.org/877/pdf