Pairing Traditional and Generic Common Knowledge

نویسنده

  • Evangelia Antonakos
چکیده

Common Knowledge C is a standard tool in epistemic logics. Generic Common Knowledge J is an alternative which has desirable logical behavior such as cut-elmination and which can be used in place of C in the analysis of many games and epistemic senarios. In order to compare their deductive strengths directly we define the multi-agent logic S4 n built on a language with both C and J operators in addition to agents’ Kis so that any finite prefix of modal operators is acceptable. We prove S4 n is complete, decidable, and that Jφ → Cφ though not Cφ → Jφ. Additional epistemic scenarios may be investigated which take advantage of this dual layer of common knowledge agents.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Convertible limited (multi-) verifier signature: new constructions and applications

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

متن کامل

Evaluating the Effectiveness of Deductive and Inductive Form-Focused In-struction on Iranian EFL Learners' Implicit and Explicit Knowledge of Non-Generic Definite Article

This study investigated the relative effects of deductive and inductive form-focused instruction (FFI) on the acquisition of 4 non-generic definite article uses(cultural, situational, structural, and textual) as assessed by explicit and implicit outcome measures. The tests utilized to assess EFL learners' acquisition of definite article uses were timed and untimed grammaticality judgment tests....

متن کامل

Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing

Phishing emails are one of today’s most common and costly forms of digital identity theft. They are now very convincing that even experts cannot tell what is and is not genuine. In a phishing attack, victims are lured by an official looking email to a fraudulent website that appears to be that of a legitimate service provider. Such attacks can be mitigated with digitally-signed emails. Unfortun...

متن کامل

Coordination of Information Sharing and Cooperative Advertising in a Decentralized Supply Chain with Competing Retailers Considering Free Riding Behavior

This paper studies a decentralized supply chain in which a manufacturer sells a common generic product through two traditional and online retailers under free riding market. We assume that the traditional retailer provides the value added services but the online retailer does not. Factors such as retail prices, local advertising of the retailers, global advertising of the manufacturer and servi...

متن کامل

Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model

Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) have emerged as a valuable tool for verifiable computation and privacy preserving protocols. Currently practical schemes require a common reference string (CRS) to be constructed in a one-time setup for each statement. Ben-Sasson, Chiesa, Green, Tromer and Virza [5] devised a multi-party protocol to securely compute such...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016