Evidential Transactions with Cyberlogic

03/20/2023
by   Harald Ruess, et al.
0

Cyberlogic is an enabling logical foundation for building and analyzing digital transactions that involve the exchange of digital forms of evidence. It is based on an extension of (first-order) intuitionistic predicate logic with an attestation and a knowledge modality. The key ideas underlying Cyberlogic are extremely simple, as (1) public keys correspond to authorizations, (2) transactions are specified as distributed logic programs, and (3) verifiable evidence is collected by means of distributed proof search. Verifiable evidence, in particular, are constructed from extra-logical elements such as signed documents and cryptographic signatures. Despite this conceptual simplicity of Cyberlogic, central features of authorization policies including trust, delegation, and revocation of authority are definable. An expressive temporal-epistemic logic for specifying distributed authorization policies and protocols is therefore definable in Cyberlogic using a trusted time source. We describe the distributed execution of Cyberlogic programs based on the hereditary Harrop fragment in terms of distributed proof search, and we illustrate some fundamental issues in the distributed construction of certificates. The main principles of encoding and executing cryptographic protocols in Cyberlogic are demonstrated. Finally, a functional encryption scheme is proposed for checking certificates of evidential transactions when policies are kept private.

READ FULL TEXT
research
11/29/2017

A Cooperative Proof of Work Scheme for Distributed Consensus Protocols

We propose a refinement to the well known, and widely used, proof-of-wor...
research
07/22/2019

Open Problems in a Logic of Gossips

Gossip protocols are programs used in a setting in which each agent hold...
research
10/08/2018

Survey of Consensus Protocols

Distributed ledger technology has gained wide popularity and adoption si...
research
09/12/2021

DELP: Dynamic Epistemic Logic for Security Protocols

The formal analysis of security protocols is a challenging field, with v...
research
06/24/2016

Epistemic Protocols for Distributed Gossiping

Gossip protocols aim at arriving, by means of point-to-point or group co...
research
02/07/2019

Distributed Ledger Privacy: Ring Signatures, Möbius and CryptoNote

Distributed ledger and blockchain systems are expected to make financial...
research
12/18/2020

An Infrastructure for Faithful Execution of Remote Attestation Protocols

Remote attestation is an emerging technology for establishing trust in a...

Please sign up or login with your details

Forgot password? Click here to reset