Automated verification of equivalence properties of cryptographic protocols

R Chadha, V Cheval, Ş Ciobâcă, S Kremer - ACM Transactions on …, 2016 - dl.acm.org
Indistinguishability properties are essential in formal verification of cryptographic protocols.
They are needed to model anonymity properties, strong versions of confidentiality, and …

Automated reasoning for equivalences in the applied pi calculus with barriers

B Blanchet, B Smyth - Journal of Computer Security, 2018 - content.iospress.com
Observational equivalence allows us to study important security properties such as
anonymity. Unfortunately, the difficulty of proving observational equivalence hinders …

Formal verification of cryptographic protocols with automated reasoning

B Smyth - 2011 - etheses.bham.ac.uk
Cryptographic protocols form the backbone of our digital society. Unfortunately, the security
of numerous critical components has been neglected. As a consequence, attacks have …

Anonymity, information, and machine-assisted proof

AR Coble - 2010 - cl.cam.ac.uk
This report demonstrates a technique for proving the anonymity guarantees of
communication systems, using a mechanised theorem-prover. The approach is based on …

Operational and epistemic approaches to protocol analysis: Bridging the gap

F Dechesne, MR Mousavi, S Orzan - International Conference on Logic for …, 2007 - Springer
Operational models of protocols, on one hand, are readable and conveniently match their
implementation, at a certain abstraction level. Epistemic models, on the other hand, are …

A survey on measuring anonymity in anonymous communication systems

T Lu, Z Du, ZJ Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The popularity of Internet applications has made communication privacy an increasingly
important security requirement. As an important aspect of privacy, anonymity ensures that a …

[PDF][PDF] Measuring and predicting anonymity

MR Koot - 2012 - dare.uva.nl
With the emergence of computers and the internet, the collection, storage and processing of
information about private lives is becoming ubiquitous. Large amounts of data about citizens …

Verifying anonymity in voting systems using CSP

M Moran, J Heather, S Schneider - Formal Aspects of Computing, 2014 - Springer
We present formal definitions of anonymity properties for voting protocols using the process
algebra CSP. We analyse a number of anonymity definitions, and give formal definitions for …

A Framework for formal analysis of anonymous communication protocols

K Yang, M Xiao - Security and Communication Networks, 2022 - Wiley Online Library
Anonymity is the property of keeping secret the identity of the user performing a certain
action. The need for anonymity may arise in a wide range of situations, like electronic voting …

Distributed Analysis with μCRL: A Compendium of Case Studies

S Blom, JR Calamé, B Lisser, S Orzan, J Pang… - … Conference on Tools …, 2007 - Springer
Abstract Models in process algebra with abstract data types can be analysed by state space
generation and reduction tools. The μ CRL toolset implements a suite of distributed …