2020 IEEE 33rd Computer Security Foundations Symposium (CSF) 2020
DOI: 10.1109/csf49147.2020.00020
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Proving Unlinkability of Stateful Protocols

Abstract: The rise of contactless and wireless devices such as mobile phones and RFID chips justifies significant concerns over privacy, and calls for communication protocols that ensure some form of unlinkability. Formally specifying this property is difficult and context-dependent, and analysing it is very complex; as is common with security protocols, several incorrect unlinkability claims can be found in the literature. Formal verification is therefore desirable, but current techniques are not sufficient to directly… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(25 citation statements)
references
References 27 publications
0
25
0
Order By: Relevance
“…Those case studies (Basic Hash [25], Hash Lock [42], LAK with pairs instead of XOR as in [41], MW [50] and Feldhofer [40]) are authentication protocols between identityspecific tags and a generic reader (having access to a shared database with authorized tags credentials). We used our tool to establish proofs of unlinkability using the notion defined in [4], [6]: an outside observer must not be able to distinguish between a system where each tag can play many sessions from a system where each tag can play at most one session.…”
Section: A Rfid Based Protocolsmentioning
confidence: 99%
See 3 more Smart Citations
“…Those case studies (Basic Hash [25], Hash Lock [42], LAK with pairs instead of XOR as in [41], MW [50] and Feldhofer [40]) are authentication protocols between identityspecific tags and a generic reader (having access to a shared database with authorized tags credentials). We used our tool to establish proofs of unlinkability using the notion defined in [4], [6]: an outside observer must not be able to distinguish between a system where each tag can play many sessions from a system where each tag can play at most one session.…”
Section: A Rfid Based Protocolsmentioning
confidence: 99%
“…These proofs follow the same global pattern: we use the induction tactic to reason on an arbitrary number of sessions, then at some point we use the equivalent tactic to transform the conditional of an action into an equivalent formula that can be removed with FA-DUP. The systematic use of authentication to establish unlinkability is reminiscent of the wellauthentication condition of [6], [41].…”
Section: A Rfid Based Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, in this paper, we proposed an authentication scheme for NFC mobile payment systems in order to resolve security problems that were observed above. The major contributions of this paper can be summarized as follows: the proposed authentication scheme for mobile payment systems is discussed; security verification using Burrows et al [35] logic and an automatic cryptographic protocol verifier (ProVerif) tool [36][37][38] is used to verify the security services; comparative security analysis shows how the proposed scheme can fully support mutual authentication, full perfect forward security and full anonymity services and can resist all types of attacks; and a comparative performance analysis shows the proposed scheme's applicability. This paper prepared as follows.…”
Section: Introductionmentioning
confidence: 99%