
tion of simple, toy TTP protocols. However, in future
work, we will look to implement the system to de-
velop a tool that can automatically find holes in real
protocols.
REFERENCES
Alchourr
´
on, C. E., G
¨
ardenfors, P., and Makinson, D.
(1985). On the logic of theory change: Partial meet
functions for contraction and revision. Journal of
Symbolic Logic, 50(2):510–530.
Barbosa, M., Barthe, G., Bhargavan, K., Blanchet, B., Cre-
mers, C., Liao, K., and Parno, B. (2021). SoK:
Computer-aided cryptography,. In IEEE Symposium
on Security and Privacy, pages 777–795.
Booth, R. and Hunter, A. (2018). Trust as a precursor to
belief revision. Journal of Artificial Intelligence Re-
search, 61:699–722.
Burrows, M., Abadi, M., and Needham, R. (1990). A logic
of authentication. ACM Transactions on Computer
Systems, 8(1):18–36.
Charrier, T., Pinchinat, S., and Schwarzentruber, F. (2019).
Symbolic model checking of public announcement
protocols. Journal of Logic and Computation,
29(8):1211–1249.
Chellas, B. (1980). Modal Logic: An Introduction. Cam-
bridge University Press.
Cremers, C. (2008). The scyther tool: Verification, falsifi-
cation, and analysis of security protocols. In Proceed-
ings of the 20th International Conference on Com-
puter Aided Verification.
Darwiche, A. and Pearl, J. (1997). On the logic of iterated
belief revision. Artificial Intelligence, 89(1-2):1–29.
Delaune, S. and Hirschi, L. (2017). A survey of symbolic
methods for establishing equivalence-based properties
in cryptographic protocols. Journal of Logical and
Algebraic Methods in Programming, 87:127–144.
Erata, F., Deng, S., Zaghloul, F., Xiong, W., Demir, O.,
and Szefer, J. (2023). Survey of approaches and tech-
niques for security verification of computer systems.
Journal on Emerging Technologies in Computing Sys-
tems, 19(1).
Fakroon, M., Alshahrani, M., Gebali, F., and Traore, I.
(2020). Secure remote anonymous user authentica-
tion scheme for smart home environment. Internet of
Things, 9:100158.
French, T. and van Ditmarsch, H. (2008). Undecidability
for arbitrary public announcement logic. In Advances
in Modal Logic, pages 23–42.
Hofer-Schmitz, K. and Stojanovi
´
c, B. (2020). Towards for-
mal verification of iot protocols: A review. Computer
Networks, 174:107233.
Hunter, A. (2024). Combined change operators for trust and
belief. In Australasian Joint Conference on Artificial
Intelligence.
Hunter, A. and Booth, R. (2019). Implicit and explicit
trust in dynamic epistemic logic. In 21st International
Workshop on Trust in Agent Societies.
Kim, M., Yu, S., Lee, J., Park, Y., and Park, Y. (2020).
Design of secure protocol for cloud-assisted elec-
tronic health record system using blockchain. Sensors,
20(10).
Nayak, A., Pagnucco, M., and Peppas, P. (2003). Dy-
namic belief change operators. Artificial Intelligence,
146:193–228.
Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J.
(2001). Spins: security protocols for sensor networks.
In Proceedings of the 7th Annual International Con-
ference on Mobile Computing and Networking, pages
189–199.
Tolmach, P., Li, Y., Lin, S.-W., Liu, Y., and Li, Z. (2021).
A survey of smart contract formal specification and
verification. ACM Comput. Surv., 54(7).
Ulrich, A., Holz, R., Hauck, P., and Carle, G. (2011). In-
vestigating the openpgp web of trust’. In Computer
Security - ESORICS., pages 489–507. Lecture Notes
in Computer Science.
van Bentham, J. (2007). Dynamic logic for belief revision.
Journal of Applied Non-Classical Logics, 17(2):129–
155.
van Bentham, J. (2014). Logical Dynamics of Information
and Interaction. Cambridge University Press.
van Ditmarsch, H. (2014). Dynamics of lying. Synthese,
191(5):745–777.
Zissis, D., Lekkas, D., and Koutsabasis, P. (2011). Cryp-
tographic dysfunctionality - a survey on user percep-
tions of digital certificates. In C.K., G., H., J., E., P.,
R., B., and A., A.-N., editors, Global Security, Safety
and Sustainability and E-Democracy.
ICAART 2025 - 17th International Conference on Agents and Artificial Intelligence
932