16th IEEE Computer Security Foundations Workshop, 2003. Proceedings.
DOI: 10.1109/csfw.2003.1212706
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity and information hiding in multiagent systems

Abstract: We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework, much in the spirit of our earlier work on secrecy [Halpern and O'Neill 2002]. We give several definitions of anonymity with respect to agents, actions, and observers in multiagent systems, and we relate our definitions of anonymity to other definitions of informat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

5
179
0
1

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 85 publications
(185 citation statements)
references
References 36 publications
5
179
0
1
Order By: Relevance
“…Axiom (25) reflects the restriction on systems needed for theorem 2, namely that there are at least two messages that agent A does not infer. In appendix A, we provide correspondence results for axioms (21) and (24). The fourth group includes all equalities and inequalities from ≡ and an omega-rule for the de dicto quantifier.…”
Section: Dual Signaturementioning
confidence: 99%
See 2 more Smart Citations
“…Axiom (25) reflects the restriction on systems needed for theorem 2, namely that there are at least two messages that agent A does not infer. In appendix A, we provide correspondence results for axioms (21) and (24). The fourth group includes all equalities and inequalities from ≡ and an omega-rule for the de dicto quantifier.…”
Section: Dual Signaturementioning
confidence: 99%
“…Often, the "standard" multi-agent system semantics [16] is used, with identity as the equivalence on local states (cf. [21,29,30,32]). But in connection with cryptography, identity is clearly inappropriate as equivalence.…”
Section: The Svo Modalitymentioning
confidence: 99%
See 1 more Smart Citation
“…In order to get epistemic specifications closer to a behavioral specification, van Eijck and Orzan [20] propose a dynamic epistemic logic. However, it seems that no mediation is necessary [16,13] and it is possible to bridge this gap by proposing a combined framework as it is also suggested in this paper. However, in the works cited above, the authors study abstract versions of protocols which do not take into account cryptographic primitives (e.g.…”
Section: Related and Future Workmentioning
confidence: 99%
“…We shall now define the satisfaction relation for epistemic formulas. As in the case of epistemic logic for distributed systems [15,16], the epistemic formulas will be interpreted over the possible "runs" of a process, i.e. the set of maximal traces (Definition 2).…”
Section: Lemma 1 Let δ Be a Closed Static Formula With No Free Namesmentioning
confidence: 99%