A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages Gamma under the theory of blind signatures and arbitrary convergent equational theories modulo associativity and commutativity (AC) of certain binary operators. The traditional formulations of intruder deduction are usually given in natural-deduction-like systems and proving decidability requires significant effort in showing that the rules are “local” in some sense. By using the well-known translation between natural deduction and sequent calculus, we recast the intruder deduction problem as proof search in sequent calculus, in which locality is immediate. Using standard proof theoretic methods, such as permutability of rules and cut elimination, we show that the intruder deduction problem can be reduced, in polynomial time, to the elementary deduction problem, which amounts to solving certain equations in the underlying individual equational theories. We show that this result extends to combinations of disjoint AC-convergent theories whereby the decidability of intruder deduction under the combined theory reduces to the decidability of elementary deduction in each constituent theory. To further demonstrate the utility of the sequent-based approach, we show that, for Dolev-Yao intruders, our sequent-based techniques can be used to solve the more difficult problem of solving deducibility constraints, where the sequents to be deduced may contain gaps (or variables) representing possible messages the intruder may produce.
💡 Research Summary
**
The paper addresses the fundamental problem of intruder deduction in the analysis of security protocols. Given a set of messages Γ and a target message M, the intruder deduction problem asks whether M can be constructed from Γ under a given equational theory that may include blind signatures, pairing, symmetric encryption, and arbitrary associative‑commutative (AC) operators. Traditionally, this problem has been formalised using natural‑deduction‑style systems. While natural deduction mirrors the intuitive introduction and elimination of constructors, its elimination rules are “top‑down”: they require the proof search to guess a subterm that may be eliminated, which makes algorithmic treatment difficult, especially for complex operators such as blind signatures. Proving decidability in that setting typically hinges on establishing a notion of “locality” – that only subterms of Γ and M need to be considered – and on handling the algebraic properties of the operators.
The authors propose a different approach: they translate the natural‑deduction system into a sequent calculus. In a sequent calculus, every inference rule satisfies the subformula property: the premises contain only subterms of the conclusion. This immediately yields locality, and proof search can be organised bottom‑up. The paper defines a sequent system that captures the same constructors (pub, sign, blind, pairing h · i, symmetric encryption {·}·) and a generic AC‑convergent equational theory E (represented by a terminating, confluent rewrite system modulo AC of the designated AC symbols). The translation from natural deduction to sequent calculus is proved sound and complete, establishing equivalence of the two presentations.
The core technical contribution is a cut‑elimination theorem for the sequent system. By showing that the cut rule can be permuted upward and eventually removed, the authors obtain cut‑free derivations. Cut‑free proofs have a very regular shape: each step is either a logical rule (introduction or elimination of a constructor) or a rewrite step using the rules of E. This leads to a normal‑form theorem: any cut‑free derivation can be transformed into a derivation where all logical inferences are grouped together and all rewrite steps are applied only to normal forms of the terms. Consequently, the intruder deduction problem reduces to the elementary deduction problem: given Γ and M, compute their normal forms with respect to E and check, for each constituent theory E_i, whether the required equations hold. The reduction is polynomial‑time: normalisation and AC‑matching are both polynomial for convergent AC‑theories, and the number of rewrite steps is bounded by the size of the input terms.
The authors extend the result to combinations of disjoint AC‑convergent theories E₁,…,Eₙ. Because the theories are disjoint, the rewrite systems do not interfere, and the reduction proceeds component‑wise: the intruder deduction problem for the combined theory is decidable iff each elementary deduction problem for E_i is decidable. This yields a uniform, modular decision procedure that subsumes many earlier ad‑hoc results for specific theories such as exclusive‑or, Abelian groups, or monoidal theories.
Beyond ground deduction, the paper tackles deducibility constraints for Dolev‑Yao intruders. Here the goal sequent may contain variables (gaps) representing messages that the intruder could produce. The authors show that the normal‑form theorem can be adapted to handle such variables, leading to a finite representation of all solutions. They construct a constraint graph that records dependencies among variables introduced by constructors, and they prove that solving the constraints reduces to a series of AC‑matching problems together with a simple unification step for the Dolev‑Yao operators. The correctness of the algorithm is formally verified in Isabelle/HOL, providing a high level of confidence in the result.
The paper is organized as follows. Section 2 introduces the two systems (natural deduction and sequent calculus) and proves their equivalence. Section 3 establishes cut‑elimination for the sequent calculus. Section 4 presents the normal‑form theorem and derives the polynomial‑time reduction to elementary deduction. Section 5 extends the framework to combinations of disjoint AC‑convergent theories. Section 6 applies the sequent‑based techniques to deducibility‑constraint solving for Dolev‑Yao intruders, and Section 7 discusses related work, highlights the methodological contribution, and outlines future directions (e.g., extending to active intruders with richer algebraic theories).
In summary, the paper demonstrates that standard proof‑theoretic tools—cut elimination, rule permutability, and normal‑form transformations—provide a clean, systematic methodology for analysing intruder capabilities under a wide class of algebraic theories. By recasting intruder deduction in a sequent calculus, the authors obtain immediate locality, a modular decision procedure for combined theories, and an effective algorithm for constraint solving, all backed by formal mechanisation. This work bridges the gap between the logical foundations of proof theory and the practical needs of security protocol analysis.
Comments & Academic Discussion
Loading comments...
Leave a Comment