2019
DOI: 10.1145/3289255
|View full text |Cite
|
Sign up to set email alerts
|

Alpha-Beta Privacy

Abstract: The formal specification of privacy goals in symbolic protocol models has proved to be not quite trivial so far. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. But then a subtle question emerges: how can we be sure that we have specified all pairs of worlds to properly reflect our intuitive privacy goal? To address this problem, we introduce in this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…For brevity, we only highlight the differences to standard first-order logic, the precise definition that we use can be found in the original paper on (α, β)privacy [5]. The main point is that in Herbrand logic fixes the universe in which to interpret all symbols.…”
Section: Herbrand Logicmentioning
confidence: 99%
See 3 more Smart Citations
“…For brevity, we only highlight the differences to standard first-order logic, the precise definition that we use can be found in the original paper on (α, β)privacy [5]. The main point is that in Herbrand logic fixes the universe in which to interpret all symbols.…”
Section: Herbrand Logicmentioning
confidence: 99%
“…Definitinon 5 (Message-analysis problem (adapted from [5])). Let α be combinatoric, struct and concr be two frames with domain D. We say that β is a message-analysis problem if β ≡ MsgAna(D, α, struct, concr ) with:…”
Section: Alpha-beta Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…Given a protocol with some intended use case, it is not immediately obvious which definition provides strong enough guarantees. Second, most definitions of unlinkability rely on some form of behavioural equivalence, which makes proofs even more difficult -this is a general problem when dealing with privacy notions, which has motivated a recent alternative approach which can avoid equivalences in some cases, not including unlinkability so far [28]. Proofs of equivalences are cumbersome, and we believe that they cannot realistically be carried out in details by hand.…”
Section: Introductionmentioning
confidence: 99%