Effectively checking or disproving the finite variant property
https://doi.org/10.1007/978-3-540-70590-1_6Abstract
An equational theory decomposed into a set B of equational axioms and a set ∆ of rewrite rules has the finite variant (FV) property in the sense of Comon-Lundh and Delaune iff for each term t there is a finite set {t1, . . . , tn} of →∆,B-normalized instances of t so that any instance of t normalizes to an instance of some ti modulo B. This is a very useful property for cryptographic protocol analysis, and for solving both unification and disunification problems. Yet, at present the property has to be established by hand, giving a separate mathematical proof for each given theory: no checking algorithms seem to be known. In this paper we give both a necessary and a sufficient condition for FV from which we derive, both an algorithm ensuring the sufficient condition, and thus FV, and another disproving the necessary condition, and thus disproving FV. These algorithms can check automatically a number of examples and counterexamples of FV known in the literature.
References (21)
- T. Arts and J. Giesl. Termination of term rewriting using dependency pairs. Theor. Comput. Sci., 236(1-2):133-178, 2000.
- H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In J. Giesl, editor, Term Rewriting and Applica- tions, 16th International Conference, RTA 2005, Nara, Japan, April 19-21, 2005, Proceedings, volume 3467 of Lecture Notes in Computer Science, pages 294-307. Springer, 2005.
- H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In LICS, pages 271-280. IEEE Computer Society, 2003.
- N. Dershowitz and J.-P. Jouannaud. Rewrite systems. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, Vol. B, pages 243-320. North-Holland, 1990.
- S. Escobar, C. Meadows, and J. Meseguer. A rewriting-based inference system for the nrl protocol analyzer and its meta-logical properties. Theor. Comput. Sci., 367(1-2):162-202, 2006.
- S. Escobar, J. Meseguer, and R. Sasse. Variant narrowing and equational uni- fication. In Accepted at: 7th International Workshop on Rewriting Logic and its Applications, 2008.
- J. Giesl and D. Kapur. Dependency pairs for equational rewriting. In A. Mid- deldorp, editor, RTA, volume 2051 of Lecture Notes in Computer Science, pages 93-108. Springer, 2001.
- J. Giesl, P. Schneider-Kamp, and R. Thiemann. Automatic termination proofs in the dependency pair framework. In U. Furbach and N. Shankar, editors, IJCAR, volume 4130 of Lecture Notes in Computer Science, pages 281-286. Springer, 2006.
- J. Giesl, R. Thiemann, and P. Schneider-Kamp. Proving and disproving termina- tion in the dependency pair framework. In F. Baader, P. Baumgartner, R. Nieuwen- huis, and A. Voronkov, editors, Deduction and Applications, 23.-28. October 2005, volume 05431 of Dagstuhl Seminar Proceedings. Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, 2006.
- J.-M. Hullot. A catalogue of canonical term rewriting systems. Technical Report CSL-113, SRI International, 1980.
- J.-P. Jouannaud, C. Kirchner, and H. Kirchner. Incremental construction of uni- fication algorithms in equational theories. In J. Díaz, editor, ICALP, volume 154 of Lecture Notes in Computer Science, pages 361-373. Springer, 1983.
- J.-P. Jouannaud and H. Kirchner. Completion of a set of rules modulo a set of equations. SIAM J. Comput., 15(4):1155-1194, 1986.
- J. Meseguer. Conditioned rewriting logic as a united model of concurrency. Theor. Comput. Sci., 96(1):73-155, 1992.
- J. Meseguer. Membership algebra as a logical framework for equational speci- fication. In F. Parisi-Presicce, editor, WADT, volume 1376 of Lecture Notes in Computer Science, pages 18-61. Springer, 1997.
- J. Meseguer and P. Thati. Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation, 20(1-2):123-160, 2007.
- É. Payet. Detecting non-termination of term rewriting systems using an unfolding operator. In G. Puebla, editor, Logic-Based Program Synthesis and Transforma- tion, 16th International Symposium, LOPSTR 2006, Venice, Italy, July 12-14, 2006, Revised Selected Papers, volume 4407 of Lecture Notes in Computer Science, pages 194-209. Springer, 2007.
- É. Payet and F. Mesnard. Non-termination inference of logic programs. ACM Trans. Program. Lang. Syst., 28(2):256-289, 2006.
- G. E. Peterson and M. E. Stickel. Complete sets of reductions for some equational theories. J. ACM, 28(2):233-264, 1981.
- TeReSe, editor. Term Rewriting Systems. Cambridge University Press, Cambridge, 2003.
- E. Viola. E-unifiability via narrowing. In A. Restivo, S. R. D. Rocca, and L. Roversi, editors, ICTCS, volume 2202 of Lecture Notes in Computer Science, pages 426-438. Springer, 2001.
- P. Viry. Equational rules for rewriting logic. Theor. Comput. Sci., 285(2):487-517, 2002.