Academia.eduAcademia.edu

Outline

Model Checking Russian Cards

2006, Electronic Notes in Theoretical Computer Science

https://doi.org/10.1016/J.ENTCS.2005.07.029

Abstract

We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results.

References (21)

  1. M.H. Albert, R.E.L. Aldred, M.D. Atkinson, H.P. van Ditmarsch, and C.C. Handley. Safe communication for card players by combinatorial designs for two-step protocols. Australasian Journal of Combinatorics, 2005. To appear.
  2. A. Baltag and L.S. Moss. Logics for epistemic programs. Synthese, 139:165- 224, 2004. Knowledge, Rationality & Action 1-60.
  3. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8:18-36, 1990.
  4. K. Engelhardt, R. van der Meyden, and Y. Moses. Knowledge and the logic of local propositions. In I. Gilboa, editor, Proceedings of TARK VII, pages 29-41.
  5. Morgan Kaufmann, 1998.
  6. R. Fagin, J.Y. Halpern, Y. Moses, and M.Y. Vardi. Reasoning about Knowledge. MIT Press, Cambridge MA, 1995.
  7. M.J. Fischer and R.N. Wright. Bounds on secret key exchange using a random deal of cards. Journal of Cryptology, 9(2):71-99, 1996.
  8. P. Gammie and R. van der Meyden. MCK: Model checking the logic of knowledge. In R. Alur and D. Peled, editors, Proceedings of the 16th International conference on Computer Aided Verification (CAV 2004), pages 479-483. Springer, 2004.
  9. J.D. Gerbrandy and W. Groeneveld. Reasoning about information change. Journal of Logic, Language, and Information, 6:147-169, 1997.
  10. J.Y. Halpern, R. van der Meyden, and M.Y. Vardi. Complete axiomatizations for reasoning about knowledge and time. SIAM Journal on Computing, 33(3):674-703, 2004.
  11. K. Koizumi, T. Mizuki, and T. Nishizeki. Necessary and sufficient numbers of cards for the transformation protocol. In K.-Y. Chwa and J. Ian Munro, editors, Computing and Combinatorics, 10th Annual International Conference (COCOON 2004), LNCS 3106, pages 92-101. Springer, 2004.
  12. Franco Raimondi and Alessio Lomuscio. Verification of multiagent systems via ordered binary decision diagrams: An algorithm and its implementation. In 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), pages 630-637. IEEE Computer Society, 2004.
  13. R. Ramanujam and S. P. Suresh. Information based reasoning about security protocols. Electr. Notes Theor. Comput. Sci., 55(1), 2001.
  14. W. van der Hoek and M. Wooldridge. Model checking knowledge and time. In D. Bosnacki and S. Leue, editors, Model Checking Software, Proceedings of SPIN 2002 (LNCS Volume 2318), pages 95-111. Springer, 2002.
  15. R. van der Meyden. Common knowledge and update in finite environments. Information and Computation, 140(2):115-157, 1998.
  16. H.P. van Ditmarsch. Descriptions of game actions. Journal of Logic, Language and Information, 11:349-365, 2002.
  17. H.P. van Ditmarsch. The russian cards problem. Studia Logica, 75:31-62, 2003.
  18. H.P. van Ditmarsch. The case of the hidden hand. In Liber Amicorum Dick de Jongh, 2004. (electronically published) ISBN 90 5776 1289.
  19. J. van Eijck. Dynamic epistemic modelling. Technical report, Centrum voor Wiskunde en Informatica, Amsterdam, 2004. CWI Report SEN-E0424.
  20. J. van Eijck and J. Ruan. Action emulation. manuscript, 2005.
  21. S. van Otterloo, W. van der Hoek, and M. Wooldridge. Model checking a knowledge exchange scenario. Applied Artificial Intelligence, 18(9-10):937-952, 2004.