Computing strong and weak bisimulations for psi-calculi

被引:8
作者
Johansson, Magnus [1 ]
Victor, Bjorn [1 ]
Parrow, Joachim [1 ]
机构
[1] Uppsala Univ, Dept Informat Technol, SE-75105 Uppsala, Sweden
来源
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING | 2012年 / 81卷 / 03期
关键词
Symbolic semantics; Bisimulation; Psi-calculi; Full abstraction; APPLIED PI CALCULUS; SYMBOLIC BISIMULATION; SECURITY PROTOCOLS; SPI CALCULUS; LOGIC;
D O I
10.1016/j.jlap.2012.01.001
中图分类号
学科分类号
摘要
We present a symbolic transition system and strong and weak bisimulation equivalences for psi-calculi, and show that they are fully abstract with respect to bisimulation congruences in the non-symbolic semantics. A procedure which computes the most general constraint under which two agents are bisimilar is developed and proved correct. A psi-calculus is an extension of the pi-calculus with nominal data types for data structures and for logical assertions representing facts about data. These can be transmitted between processes and their names can be statically scoped using the standard pi-calculus mechanism to allow for scope migrations. Psi-calculi can be more general than other proposed extensions of the pi-calculus such as the applied pi-calculus, the spi-calculus, the fusion calculus, or the concurrent constraint pi-calculus. Symbolic semantics are necessary for an efficient implementation of the calculus in automated tools exploring state spaces, and the full abstraction property means the symbolic semantics makes exactly the same distinctions as the original. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:162 / 180
页数:19
相关论文
共 33 条
[1]   Analyzing security protocols with secrecy types and logic programs [J].
Abadi, M ;
Blanchet, B .
JOURNAL OF THE ACM, 2005, 52 (01) :102-146
[2]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[3]  
[Anonymous], GEODERMA
[4]  
Bengtson J., 2011, LOG METH COMPUT SCI, V7, P1
[5]  
BENGTSON J, 2010, THESIS UPPSALA U
[6]   Psi-calculi: Mobile processes, nominal data, and logic [J].
Bengtson, Jesper ;
Johansson, Magnus ;
Parrow, Joachim ;
Victor, Bjorn .
24TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2009, :39-48
[7]  
Bengtson J, 2009, LECT NOTES COMPUT SC, V5674, P99, DOI 10.1007/978-3-642-03359-9_9
[8]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[9]   Automated verification of selected equivalences for security protocols [J].
Blanchet, Bruno ;
Abadi, Martin ;
Fournet, Cedric .
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01) :3-51
[10]   A symbolic semantics for the pi-calculus [J].
Boreale, M ;
DeNicola, R .
INFORMATION AND COMPUTATION, 1996, 126 (01) :34-52