We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the security guarantees are usually stated as equivalences. While process calculi provide a natural means to describe the protocols themselves, epistemic logics are often better suited for expressing certain security properties such as secrecy and anonymity. We intend to bridge the gap between these two approaches: using the set of traces generated by a process as models, we define a logic which has constructs for reasoning about both intruder's epistemic knowledge and the set of messages in possession of the intruder. As an example we consider two formalizations of privacy in electronic voting and study the relationship between them. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
Chadha, R., Delaune, S., & Kremer, S. (2009). Epistemic logic for the applied Pi calculus. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5522 LNCS, pp. 182–197). https://doi.org/10.1007/978-3-642-02138-1_12
Mendeley helps you to discover research relevant for your work.