DISSERTATION Defense held on 18 / 11 / 2013 in Luxembourg to obtain the degree of DOCTEUR DE L ’ UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE
نویسنده
چکیده
Privacy protection is an important requirement in both everyday life and the Inter-net. As the Internet is an open network, adversaries can observe and manipulate data flowing over it. To ensure privacy in communications over open networks, cryptographic protocols have been widely used, and thus, proposing such protocols has become a popular research area. However, design of cryptographic protocols is difficult and error-prone. Thus, verification of such protocols is a necessary step before implementation. Formal analysis has shown its strength in proving or disproving privacy properties of cryptographic protocols, contrary to informal verification of cryptographic protocols which is not suitable for finding subtle privacy flaws. To formally verify whether a protocol satisfies a property, there are usually three steps: 1) formally model the protocol, 2) formalise the property and 3) decide whether the formalised property is satisfied on the formal model. Depending on the differences on the formalisms used to model the protocol and the property, there are various formal approaches. Once a formal approach is chosen, that is, the first and third steps are determined, one only needs to focus on the second step. In this thesis, we use a formalism called the applied pi calculus. The applied pi calculus provides an intuitive way to model cryptographic protocols. In addition, the applied pi calculus is equipped with proof techniques for privacy properties modelled as equivalences of processes. Furthermore, the verification of a protocol modelled in the applied pi calculus is supported by an automatic verification tool ProVerif. Many privacy properties have been proposed, most of which are with respect to an adversary controlling the network. Recently, a stronger privacy property was identified in the e-voting domain. This privacy property assumes that the adversary can perform extra actions, namely bribing or coercing voters, to obtain additional information. To distinguish such strong privacy properties, we from here refer to these as enforced privacy, capturing the idea that the system enforces privacy, even if users try to reveal themselves due to bribery or coercion. Properties such as receipt-freeness and coercion-resistance, have been formalised in e-voting, to formally verify whether a protocol satisfies enforced privacy. The leading work of formalising enforced privacy in the applied pi calculus is the DKR framework, proposed by Delaune et al. Following studies of enforced privacy in e-voting, protocols ensuring enforced privacy have also been proposed in other domains, e-auctions and e-health. However, such protocols have not been …
منابع مشابه
DISSERTATION Defense held on 21 October 2013 in Luxembourg to obtain the degree of DOCTEUR DE L ’ UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE by Tim Johannes Christina
متن کامل
De L ’ Université Du Luxembourg En Informatique and Docteur De L ’ Université De Lorraine
Peer-to-peer real-time communication and media streaming applications optimize their performance by using application-level topology estimation services such as virtual coordinate systems. Virtual coordinate systems allow nodes in a peer-to-peer network to accurately predict latency between arbitrary nodes without the need of performing extensive measurements. However, systems that leverage vir...
متن کاملDefense held on 30 / 06 / 2011 in Luxembourg to obtain the degree of DOCTEUR DE L ’ UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE by
Over recent years, the popularity of mobile networks has grown as a consequence of the ubiquity of communication devices. In many mobile networks, nodes can move freely and connect to their neighbours as they move into each other’s radio range. However, due to high node mobility, limited bandwidth or energy, radio obstruction or malicious attacks, the route between source node and destination n...
متن کاملOrder-parameter symmetries of domain walls in ferroelectrics and ferroelastics
Pierre Tolédano,1 Mael Guennou,2,* and Jens Kreisel2,3 1Laboratoire des Systèmes Complexes, Université de Picardie, 80000 Amiens, France 2Département Science et Analyse des Matériaux, CRP Gabriel Lippmann, 41 rue du Brill, L-4422 Luxembourg 3Physics and Materials Science Research Unit, University of Luxembourg, 41 Rue du Brill, L-4422 Belvaux, Luxembourg (Received 22 January 2014; revised manus...
متن کاملCarbon capture and storage and transboundary pollution: A differential game approach
We study the strategic behavior of two countries facing transboundary pollution under a differential game setting. In our model, the reduction of both pollution and CO2 concentration occur through the creation of pollution sinks, rather than through the adoption of cleaner technologies. To our knowledge, this is the first formal attempt to model carbon capture and storage. Furthermore, we provi...
متن کامل