Automated Verifying Anonymity and Privacy Properties of Security Protocols
نویسندگان
چکیده
Security protocols play more and more important role with widely use in many applications nowadays. They are designed to provide security properties for users who wish to exchange messages over unsecured medium. There are many tools were designed to specify and verify security protocols such as Casper/FDR, ProVerif or AVISPA. While most of the existing tools focus on secrecy and authentication properties. few supports properties like anonymity and privacy, which are crucial in many protocols such as in electronic voting systems or anonymous online transactions. Moreover, to the best of our knowledge, there is still not have a fully automatic tool using formal methods to verify these two properties. In this paper, we introduce a framework for specifying security protocols in the Labeled Transition System (LTS) semantics model and give the formal definition for three existing types of anonymity and privacy properties using this model. We also come up with the verification algorithms for verification and implement all the ideas in a module SeVe inside PAT model checker.
منابع مشابه
A Framework for Automatic Verifying Privacy Properties of Security Protocols
Security protocols play more and more important role with widely use in many applications nowadays. They are designed to provide security properties for users who wish to exchange messages over unsecured medium. There are many tools were designed to specify and verify security protocols such as Casper/FDR, ProVerif or AVISPA. While most of the existing tools focus on secrecy and authentication ...
متن کاملA Security API for Distributed Social Networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. We illustrate our technique on a core API for social networking, which includes methods for establishing social relations and for sharing resources. The cryptographic protocols implementing these methods use pseudonyms to hide user identit...
متن کاملVerifying equivalence properties of security protocols
Security protocols are used nowadays for securing transactions through public channels, like the Internet. Typical examples of applications include electronic commerce, electronic voting or mobile ad hoc networking. In order to obtain as much confidence as possible, several formal methods have been proposed for analyzing properties of security protocols. Depending on the goals which a security ...
متن کاملAnoA: A Framework For Analyzing Anonymous Communication Protocols Anonymity meets differential privacy
Protecting individuals’ privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a fr...
متن کاملSymbolic Malleable Zero-knowledge Proofs
Zero-knowledge (ZK) proofs have become a central building block for a variety of modern security protocols, e.g., as ZK-SNARKs in Pinocchio (IEEE S&P 2013) and ADSNARK (IEEE S&P 2015). One of the reasons is that modern ZK constructions, such as the Groth-Sahai proof system, offer novel types of cryptographic flexibility: a participant is able to re-randomize existing ZK proofs to achieve, for i...
متن کامل