Home

Categorical composable cryptography: extended version


We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting subsets of adversaries in a modular, flexible fashion. We conclude by using string diagrams to rederive the security of the one-time pad, correctness of Diffie-Hellman key exchange and no-go results concerning the limits of bipartite and tripartite cryptography, ruling out e.g., composable commitments and broadcasting. On the way, we exhibit two categorical constructions of resource theories that might be of independent interest: one capturing resources shared among multiple parties and one capturing resource conversions that succeed asymptotically. This is a corrected version of the paper arXiv:2208.13232 published originally on December 18, 2023.


Published on October 22, 2024
A cone-theoretic barycenter existence theorem


We show that every continuous valuation on a locally convex, locally convex-compact, sober topological cone $\mathfrak{C}$ has a barycenter. This barycenter is unique, and the barycenter map $\beta$ is continuous, hence is the structure map of a $\mathbf V_{\mathrm w}$-algebra, i.e., an Eilenberg-Moore algebra of the extended valuation monad on the category of $T_0$ topological spaces; it is, in fact, the unique $\mathbf V_{\mathrm w}$-algebra that induces the cone structure on $\mathfrak{C}$.


Published on October 10, 2024
Asynchronous Session-Based Concurrency: Deadlock-freedom in Cyclic Process Networks


We tackle the challenge of ensuring the deadlock-freedom property for message-passing processes that communicate asynchronously in cyclic process networks. Our contributions are twofold. First, we present Asynchronous Priority-based Classical Processes (APCP), a session-typed process framework that supports asynchronous communication, delegation, and recursion in cyclic process networks. Building upon the Curry-Howard correspondences between linear logic and session types, we establish essential meta-theoretical results for APCP, most notably deadlock freedom. Second, we present a new concurrent $\lambda$-calculus with asynchronous session types, dubbed LASTn. We illustrate LASTn by example and establish its meta-theoretical results; in particular, we show how to soundly transfer the deadlock-freedom guarantee from APCP. To this end, we develop a translation of terms in LASTn into processes in APCP that satisfies a strong formulation of operational correspondence.


Published on October 7, 2024
Fair Asynchronous Session Subtyping


Session types are widely used as abstractions of asynchronous message passing systems. Refinement for such abstractions is crucial as it allows improvements of a given component without compromising its compatibility with the rest of the system. In the context of session types, the most general notion of refinement is asynchronous session subtyping, which allows message emissions to be anticipated w.r.t. a bounded amount of message consumptions. In this paper we investigate the possibility to anticipate emissions w.r.t. an unbounded amount of consumptions: to this aim we propose to consider fair compliance over asynchronous session types and fair refinement as the relation that preserves it. This allows us to propose a novel variant of session subtyping that leverages the notion of controllability from service contract theory and that is a sound characterisation of fair refinement. In addition, we show that both fair refinement and our novel subtyping are undecidable. We also present a sound algorithm which deals with examples that feature potentially unbounded buffering. Finally, we present an implementation of our algorithm and an empirical evaluation of it on synthetic benchmarks.


Published on October 7, 2024
A higher-order transformation approach to the formalization and analysis of BPMN using graph transformation systems


The Business Process Modeling Notation (BPMN) is a widely used standard notation for defining intra- and inter-organizational workflows. However, the informal description of the BPMN execution semantics leads to different interpretations of BPMN elements and difficulties in checking behavioral properties. In this article, we propose a formalization of the execution semantics of BPMN that, compared to existing approaches, covers more BPMN elements while also facilitating property checking. Our approach is based on a higher-order transformation from BPMN models to graph transformation systems. To show the capabilities of our approach, we implemented it as an open-source web-based tool.


Published on October 7, 2024

Managing Editors

 

Stefan Milius
Editor-in-Chief

Brigitte Pientka
Fabio Zanasi
Executive Editors


Editorial Board
Executive Board
Publisher

eISSN: 1860-5974


Logical Methods in Computer Science is an open-access journal, covered by SCOPUS, DBLPWeb of Science, Mathematical Reviews and Zentralblatt. The journal is a member of the Free Journal Network. All journal content is licensed under a Creative Commons license.