for the number of allowed permutations. Let for each
agent a ∈ A, M
a
be the set of messages sent by agent
a. Then M = ∪
a∈A
M
a
. Since M
a
∩M
b
=
/
0 for a 6= b,
|M | =
∑
a∈A
|M
a
|. Let SA be the set of allowed per-
mutations. Then,
|SA| =
|M |!
∏
a∈A
|M
a
|!
In case each agent sends only one message, we have
|SA| = |M |!. Once again, the detailed analysis is pro-
vided in (Das and Ghosh, 2020).
5.1 Time Complexity for BSS Protocol
In this section we provide a possible implementation
of the action update model for BSS protocol and its
time complexity. The implementation has two steps:
1. Given set of agents A and set of messages M
build the initial model according to BSS protocol.
2. Update the model according to the BSS proto-
col as messages are received by agents until each
message is received by all the other agents except
for the sender.
The time complexity of each of the above steps
is O(|A||M |!). Thus total time complexity of the
entire implementation is O(|A ||M |! + |A||M |!), i.e.,
O(|A||M |!) (for a detailed analysis see (Das and
Ghosh, 2020)).
5.2 Time Complexity for LME Protocol
In this section we provide a possible implementation
of the action update model for LME protocol and its
time complexity. The implementation has two steps:
1. Given a set of agents A and a set of requests M
build the initial model according to LME protocol.
2. Update the model according to LME protocol as
messages are sent and received by agents until
each message is received by all the other agents
except the sender.
The time complexity of each of the above steps
is O(|A||M |!). Thus total time complexity of the
entire implementation is O(|A||M |! + |A ||M |!), i.e,
O(|A||M |!) (for a detailed analysis see (Das and
Ghosh, 2020)).
6 CONCLUSION AND FUTURE
DIRECTIONS
To summarize, we have shown that simple variants of
dynamic epistemic logic can indeed be used to model
distributed protocols in asynchronous settings. The
knowledge-based framework can be used to model
the effect of these protocols, and the underlying rea-
soning process becomes explicit. In some sense, the
action update operators model the effect of receipt of
messages, and can be considered as private announce-
ments to the individual processes/agents. However,
the logical languages developed here are protocol-
specific and quite ad hoc in nature. It would be in-
teresting to see whether a uniform framework could
be developed and how that framework would relate
to the existing literature on announcement logics. We
leave this for the future.
Another direction to work on is to bring other
distributed protocols in the purview of the logical
framework described here. To this end, one can con-
sider Maekawa’s quorum based mutual exclusion al-
gorithm (Singhal and Shivaratri, 1994), where each
process consults only a proper subset of all processes
before accessing the critical section. It would be in-
teresting to see the variant of dynamic epistemic logic
which could be used to model the underlying reason-
ing process of the protocol.
REFERENCES
Ahmadi, S., Fallah, M. S., and Pourmahdian, M. (2019).
On the properties of epistemic and temporal epistemic
logics of authentication. Informatica, 43(2).
Balbiani, P., van Ditmarsch, H., and Gonz
´
alez, S. F.
(2020). From public announcements to asynchronous
announcements. In Giacomo, G. D., Catala, A., Dilk-
ina, B., Milano, M., Barro, S., Bugar
´
ın, A., and Lang,
J., editors, Proceedings of the 24th European Confer-
ence on Artificial Intelligence, volume 325 of Fron-
tiers in Artificial Intelligence and Applications.
Baltag, A. and Smets, S. (2008). A qualitative theory of
dynamic interactive belief revision. In Bonanno, G.,
van der Hoek, W., and Wooldridge, M., editors, Logic
and the Foundations of Game and Decision Theory
(LOFT07), volume 3 of Texts in Logic and Games,
pages 9–58. Amsterdam University Press, Amster-
dam.
Das, S. and Ghosh, S. (2020). Receiving messages in their
correct order: Analyzing broadcast protocols in dy-
namic epistemic logic (a technical report). Technical
report, Indian Statistical Institute.
Dechesne, F. and Wang, Y. (2010). To know or not to know:
epistemic approaches to security protocol verification.
Synthese, 177(1):51–76.
Halpern, J. Y. and Zuck, L. D. (1992). A little knowledge
goes a long way: knowledge-based derivations and
correctness proofs for a family of protocols. Journal
of the ACM (JACM), 39(3):449–478.
Knight, S., Maubert, B., and Schwarzentruber, F. (2019).
Reasoning about knowledge and messages in asyn-
Receiving Messages in Their Correct Order: Analyzing Broadcast Protocols in Dynamic Epistemic Logics
857