2019
DOI: 10.3233/jcs-171070
|View full text |Cite
|
Sign up to set email alerts
|

A method for unbounded verification of privacy-type properties

Abstract: In this paper, we consider the problem of verifying anonymity and unlinkability in the symbolic model, where protocols are represented as processes in a variant of the applied pi calculus, notably used in the ProVerif tool. Existing tools and techniques do not allow to verify directly these properties, expressed as behavioral equivalences. We propose a different approach: we design two conditions on protocols which are sufficient to ensure anonymity and unlinkability, and which can then be effectively checked … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 19 publications
(64 citation statements)
references
References 52 publications
0
59
1
Order By: Relevance
“…Note that the protocol is claimed to be untraceable in [34] for a weaker notion of unlinkability. Strong unlinkability as being checked here may be considered too strong but [41], [40] discuss how a variant of the attack found here constitutes a practical privacy breach.…”
Section: Analysis Of Behavioral Equivalence Propertiesmentioning
confidence: 94%
See 2 more Smart Citations
“…Note that the protocol is claimed to be untraceable in [34] for a weaker notion of unlinkability. Strong unlinkability as being checked here may be considered too strong but [41], [40] discuss how a variant of the attack found here constitutes a practical privacy breach.…”
Section: Analysis Of Behavioral Equivalence Propertiesmentioning
confidence: 94%
“…Those constructions are unrelated in general [23], it seems that UK 3 is strictly stronger than the others [41] for realistic classes of protocols. Comparing the three notions is out the scope of this paper but being able to analyze all of them enables us to provide more fine-grained security guarantees.…”
Section: B Lak'06mentioning
confidence: 97%
See 1 more Smart Citation
“…There have been many works of literature (e.g., [24][25][26][27][28]) that employ process calculus. Typed process calculus displays security information (e.g., [29][30][31][32][33]) by the idea of standard static-analysis.…”
Section: Related Workmentioning
confidence: 99%
“…While most of these communications rely on cryptography to ensure secrecy or authenticity, little is done to protect the user's privacy. Contactless cards and cell phones reveal identities in clear [30], [31], and several traceability attacks are available even when anonymity is ensured [6], [7], [21], [13]. It has thus become easy to track individuals through their personal devices.…”
Section: Introductionmentioning
confidence: 99%