作者
Tom Chothia, Simona Orzan, Jun Pang, Mohammad Torabi Dashti
发表日期
2007
研讨会论文
Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers 2
页码范围
301-318
出版商
Springer Berlin Heidelberg
简介
We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a protocol specification in μCRL, by using a combination of dedicated tools and existing state-of-the-art μCRL tools. To illustrate the flexibility of our method we test the Dining Cryptographers problem and the FOO 92 voting protocol. Our definitions of anonymity provide an accurate picture of the different ways that anonymity can break down, due for instance to coallitions of inside intruders. Our calculations can be performed …
引用总数
2007200820092010201120122013201420152016201720182019202020212022668443631112111
学术搜索中的文章
T Chothia, S Orzan, J Pang, M Torabi Dashti - … Global Computing: Second Symposium, TGC 2006 …, 2007