On Closure under Complementation of Equational Tree Automata for Theories Extending AC

We study the problem of closure under complementation of languages accepted by one-way and two-way tree automata modulo equational theories. We deal with the equational theories of commutative monoids (ACU), idempotent commutative monoids (ACUI), Abelian groups (ACUM), and the theories of exclusive-or (ACUX), generalized exclusive-or (ACUX n ), and distributive minus symbol (ACUD). While the one-way automata for all these theories are known to be closed under intersection, the situation is strikingly different for complementation. We show that one-way ACU and ACUD automata are closed under complementation, but one-way ACUX, ACUX n , ACUM and ACUI automata are not. The same results hold for the two-way automata, except for the theory ACUI, as the two-way automata modulo all these theories except ACUI are known to be as expressive as the one-way automata. The question of closure under intersection and complementation of two-way ACUI automata is open.

[1]  Grzegorz Rozenberg,et al.  Handbook of Formal Languages , 1997, Springer Berlin Heidelberg.

[2]  Peter Y. A. Ryan,et al.  An Attack on a Recursive Authentication Protocol. A Cautionary Tale , 1998, Inf. Process. Lett..

[3]  Denis Lugiez A Good Class of Tree Automata , 1998 .

[4]  Hitoshi Ohsaki,et al.  Beyond Regularity: Equational Tree Automata for Associative and Commutative Theories , 2001, CSL.

[5]  Jean Goubault-Larrecq,et al.  A Method for Automatic Cryptographic Protocol Verification , 2000, IPDPS Workshops.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Jean Goubault-Larrecq A Method for Automatic Cryptographic Protocol Verification ( Extended , 2000 .

[8]  Hubert Comon,et al.  Tree automata techniques and applications , 1997 .

[9]  Kumar Neeraj Verma,et al.  Two-Way Equational Tree Automata for AC-Like Theories: Decidability and Closure Properties , 2003, RTA.

[10]  Michael Hanus,et al.  The Integration of Functions into Logic Programming: From Theory to Practice , 1994, J. Log. Program..

[11]  Robin Milner,et al.  On Observing Nondeterminism and Concurrency , 1980, ICALP.

[12]  Lawrence C. Paulson,et al.  Mechanized proofs for a recursive authentication protocol , 1997, Proceedings 10th Computer Security Foundations Workshop.

[13]  Denis Lugiez,et al.  Counting and Equality Constraints for Multitree Automata , 2003, FoSSaCS.

[14]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[15]  Denis Lugiez,et al.  A Good Class of Tree Automata and Application to Inductive Theorem Proving , 1998, ICALP.

[16]  Ian Glendinning,et al.  Parallel and Distributed Processing , 2001, Digital Image Analysis.

[17]  Thomas Colcombet Rewriting in the partial algebra of typed terms modulo AC , 2002, INFINITY.

[18]  Moshe Y. Vardi Reasoning about The Past with Two-Way Automata , 1998, ICALP.

[19]  S. Ginsburg,et al.  Semigroups, Presburger formulas, and languages. , 1966 .

[20]  Alex K. Simpson,et al.  Computational Adequacy in an Elementary Topos , 1998, CSL.

[21]  David Monniaux Abstracting cryptographic protocols with tree automata , 2003, Sci. Comput. Program..

[22]  Toshinori Takai,et al.  Decidability and Closure Properties of Equational Tree Languages , 2002, RTA.

[23]  Ferenc Gécseg,et al.  Tree Languages , 1997, Handbook of Formal Languages.