Epistemic Verification of Anonymity

نویسندگان

  • Jan van Eijck
  • Simona Orzan
چکیده

Model checking techniques for communication protocols usually are phrased in terms of processes, basically labelled arcs in a labelled transition system. We propose to lift checking for such protocols to a more abstract level by analysing the protocols as composite communicative actions, with a communicative action viewed as a mapping on an appropriate class of epistemic models. As an example, we analyse an anonymous broadcast protocol (Chaum’s well-known dining cryptographers protocol) and an electronic voting protocol. Reasoning about Knowledge and Ignorance The riddle of the caps:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Receipt-Freeness as a Special Case of Anonymity in Epistemic Logic?

Formal methods have provided us with tools to check both anonymity of protocols and – more specifically – receipt-freeness of voting protocols. One of the frameworks used for proving anonymity is epistemic logic. However, to the best of our knowledge, epistemic logic has never been used to prove receipt-freeness of voting protocols. Still, the concept of indistinguishability used in formalizing...

متن کامل

Anonymity in Voting Revisited

According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymit...

متن کامل

An Epistemic Approach to Compositional Reasoning about Anonymity and Privacy

In this paper, we present an epistemic logic approach to the compositionality of several privacy-related informationhiding/disclosure properties. The properties considered here are anonymity, privacy, onymity, and identity. Our initial observation reveals that anonymity and privacy are not necessarily sequentially compositional; this means that even though a system comprising several sequential...

متن کامل

A Logic of Anonymity

Our project concerns anonymity, that is the ability of users in a system to transmit information without revealing their own identities. There are a number of protocols claiming to guarantee users’ anonymity in different situations, but there is no clear way to compare these protocols in terms of how anonymous their users really are. In order to develop a measure of anonymity, we need to be abl...

متن کامل

Group Principals and the Formalization of Anonymity

We introduce the concept of a group principal and present a number of different classes of group principals, including threshold-group-principals. These appear to naturally useful concepts for looking at security. We provide an associated epistemic language and logic and use it to reason about anonymity protocols and anonymity services, where protection properties are formulated from the intrud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 168  شماره 

صفحات  -

تاریخ انتشار 2007