CSP and Anonymity

نویسندگان

  • Steve A. Schneider
  • Abraham Sidiropoulos
چکیده

Security protocols are designed to meet particular security properties In order to analyse such protocols formally it is necessary to provide a formal de nition of the property that they are intended to provide This paper is concerned with the property of anonymity It proposes a de nition of anonymity within the CSP notation discusses the approach taken by CSP to anonymity with respect to di erent view points and illustrates this approach on some toy examples and then applies it to a machine assisted analysis of the dining cryptographers example and some variants

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymity and CSP for Voting Systems

In this paper, we present a concise formal definition of anonymity for voting protocols using process algebra Communicating Sequential Processes (CSP). We analyse a number of anonymity definitions and give the formal definitions for the strong and weak anonymity highlighting the difference between them. It shows us that the strong anonymity definition is not an appropriate definition as it is t...

متن کامل

Parameterised Anonymity

We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols with an arbitrary number of participants. This definition is an extension of the well known CSP anonymity formalization of Schneider and Sidiropoulos [23]. Using recently developed invariant techniques for solving parameterised boolean equation systems, we then show that the Dining Cryptographer...

متن کامل

Anonymity and Information Hiding in Multiagent Systems

We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework, much in the spirit of our earlier work on secrecy [Halpern and O’Neill 2002]. We give several definitions of anonymity with respect to agents, act...

متن کامل

Automated Anonymity Verification of the ThreeBallot Voting System

In recent years, a large number of secure voting protocols have been proposed in the literature. Often these protocols contain flaws, but because they are complex protocols, rigorous formal analysis has proven hard to come by. Rivest’s ThreeBallot voting system is important because it aims to provide security (voter anonymity and voter verifiability) without requiring cryptography. In this pape...

متن کامل

Hepatoprotective effect of Crocus sativus (saffron) petals extract against acetaminophen toxicity in male Wistar rats

Objectives: Acetaminophen (APAP) toxicity is known to be common and potentially fatal. This study aims to investigate the protective effects of hydroalcoholic extract, remaining from Crocus sativus petals (CSP) against APAP-induced hepatotoxicity by measuring the blood parameters and studying the histopathology of liver in male rats. Materials and Methods: Wister rats (24) were randomly assigne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996