Pairing Traditional and Generic Common Knowledge
نویسنده
چکیده
Common Knowledge C is a standard tool in epistemic logics. Generic Common Knowledge J is an alternative which has desirable logical behavior such as cut-elmination and which can be used in place of C in the analysis of many games and epistemic senarios. In order to compare their deductive strengths directly we define the multi-agent logic S4 n built on a language with both C and J operators in addition to agents’ Kis so that any finite prefix of modal operators is acceptable. We prove S4 n is complete, decidable, and that Jφ → Cφ though not Cφ → Jφ. Additional epistemic scenarios may be investigated which take advantage of this dual layer of common knowledge agents.
منابع مشابه
Convertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملEvaluating the Effectiveness of Deductive and Inductive Form-Focused In-struction on Iranian EFL Learners' Implicit and Explicit Knowledge of Non-Generic Definite Article
This study investigated the relative effects of deductive and inductive form-focused instruction (FFI) on the acquisition of 4 non-generic definite article uses(cultural, situational, structural, and textual) as assessed by explicit and implicit outcome measures. The tests utilized to assess EFL learners' acquisition of definite article uses were timed and untimed grammaticality judgment tests....
متن کاملSeparable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Phishing emails are one of today’s most common and costly forms of digital identity theft. They are now very convincing that even experts cannot tell what is and is not genuine. In a phishing attack, victims are lured by an official looking email to a fraudulent website that appears to be that of a legitimate service provider. Such attacks can be mitigated with digitally-signed emails. Unfortun...
متن کاملCoordination of Information Sharing and Cooperative Advertising in a Decentralized Supply Chain with Competing Retailers Considering Free Riding Behavior
This paper studies a decentralized supply chain in which a manufacturer sells a common generic product through two traditional and online retailers under free riding market. We assume that the traditional retailer provides the value added services but the online retailer does not. Factors such as retail prices, local advertising of the retailers, global advertising of the manufacturer and servi...
متن کاملScalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) have emerged as a valuable tool for verifiable computation and privacy preserving protocols. Currently practical schemes require a common reference string (CRS) to be constructed in a one-time setup for each statement. Ben-Sasson, Chiesa, Green, Tromer and Virza [5] devised a multi-party protocol to securely compute such...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016