Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus

Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exceptional circumstances, such as to assist in a criminal investigation. A protocol for achieving anonymity with identity escrow has been presented by Marshall and Molina-Jiminez. In this paper, we show that protocol suffers ...

متن کامل

On Anonymity with Identity Escrow

Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exceptional circumstances, such as to assist in a criminal investigation. A protocol for achieving anonymity with identity escrow has been presented by Marshall and Molina-Jiminez. In this paper, we show that that protocol suf...

متن کامل

Stateful Applied Pi Calculus

We extend the applied pi calculus with state cells, which are used toreason about protocols that store persistent information. Examples are protocolsinvolving databases or hardware modules with internal state. We distinguish be-tween private state cells, which are not available to the attacker, and public statecells, which arise when a private state cell is compromised by the at...

متن کامل

Applied pi calculus

The applied pi calculus is a language for modelling security protocols. It is an extension of the pi calculus, a language for studying concurrency and process interaction. This chapter presents the applied pi calculus in a tutorial style. It describes reachability, correspondence, and observational equivalence properties, with examples showing how to model secrecy, authentication, and privacy a...

متن کامل

Analyzing an Electronic Cash Protocol Using Applied Pi Calculus

Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However, most of them have not been formally proved to be untraceable and unreuseable. In this paper we propose to use the applied pi calculus as a framework for describing and analyzing electronic cash protocols, and we analyze Fergu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Information and System Security

سال: 2010

ISSN: 1094-9224,1557-7406

DOI: 10.1145/1880022.1880035