CSP and Anonymity
نویسندگان
چکیده
Security protocols are designed to meet particular security properties In order to analyse such protocols formally it is necessary to provide a formal de nition of the property that they are intended to provide This paper is concerned with the property of anonymity It proposes a de nition of anonymity within the CSP notation discusses the approach taken by CSP to anonymity with respect to di erent view points and illustrates this approach on some toy examples and then applies it to a machine assisted analysis of the dining cryptographers example and some variants
منابع مشابه
Anonymity and CSP for Voting Systems
In this paper, we present a concise formal definition of anonymity for voting protocols using process algebra Communicating Sequential Processes (CSP). We analyse a number of anonymity definitions and give the formal definitions for the strong and weak anonymity highlighting the difference between them. It shows us that the strong anonymity definition is not an appropriate definition as it is t...
متن کاملParameterised Anonymity
We introduce the notion of parameterised anonymity, to formalize the anonymity property of protocols with an arbitrary number of participants. This definition is an extension of the well known CSP anonymity formalization of Schneider and Sidiropoulos [23]. Using recently developed invariant techniques for solving parameterised boolean equation systems, we then show that the Dining Cryptographer...
متن کاملAnonymity and Information Hiding in Multiagent Systems
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework, much in the spirit of our earlier work on secrecy [Halpern and O’Neill 2002]. We give several definitions of anonymity with respect to agents, act...
متن کاملAutomated Anonymity Verification of the ThreeBallot Voting System
In recent years, a large number of secure voting protocols have been proposed in the literature. Often these protocols contain flaws, but because they are complex protocols, rigorous formal analysis has proven hard to come by. Rivest’s ThreeBallot voting system is important because it aims to provide security (voter anonymity and voter verifiability) without requiring cryptography. In this pape...
متن کاملHepatoprotective effect of Crocus sativus (saffron) petals extract against acetaminophen toxicity in male Wistar rats
Objectives: Acetaminophen (APAP) toxicity is known to be common and potentially fatal. This study aims to investigate the protective effects of hydroalcoholic extract, remaining from Crocus sativus petals (CSP) against APAP-induced hepatotoxicity by measuring the blood parameters and studying the histopathology of liver in male rats. Materials and Methods: Wister rats (24) were randomly assigne...
متن کامل