Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CSF.2010.15guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Analysing Unlinkability and Anonymity Using the Applied Pi Calculus

Published: 17 July 2010 Publication History

Abstract

An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets’ behaviour, and so, threaten their privacy. In response to this danger, unlinkable protocols aim to make it impossible for a third party to identify two runs of a protocol as coming from the same device. We present a framework for analysing unlinkability and anonymity in the applied pi calculus. We show that unlinkability and anonymity are complementary properties; one does not imply the other. Using our framework we show that the French RFID e-passport preserves anonymity but it is linkable therefore anyone carrying a French e-passport can be physically traced.

Cited By

View all
  • (2024)SSI, from Specifications to Protocol? Formally Verify Security!Proceedings of the ACM Web Conference 202410.1145/3589334.3645426(1620-1631)Online publication date: 13-May-2024
  • (2023)When privacy fails, a formula describes an attackTheoretical Computer Science10.1016/j.tcs.2023.113842959:COnline publication date: 30-May-2023
  • (2019)Typing Messages for Free in Security ProtocolsACM Transactions on Computational Logic10.1145/334350721:1(1-52)Online publication date: 12-Sep-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CSF '10: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium
July 2010
333 pages
ISBN:9780769540825

Publisher

IEEE Computer Society

United States

Publication History

Published: 17 July 2010

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)SSI, from Specifications to Protocol? Formally Verify Security!Proceedings of the ACM Web Conference 202410.1145/3589334.3645426(1620-1631)Online publication date: 13-May-2024
  • (2023)When privacy fails, a formula describes an attackTheoretical Computer Science10.1016/j.tcs.2023.113842959:COnline publication date: 30-May-2023
  • (2019)Typing Messages for Free in Security ProtocolsACM Transactions on Computational Logic10.1145/334350721:1(1-52)Online publication date: 12-Sep-2019
  • (2017)A Type System for Privacy PropertiesProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3133998(409-423)Online publication date: 30-Oct-2017
  • (2017)A Cross-Layer and Optimized Privacy Method in Vehicular Ad-Hoc NetworksWireless Personal Communications: An International Journal10.1007/s11277-017-4599-z97:3(3331-3353)Online publication date: 1-Dec-2017
  • (2017)Analysis of privacy in mobile telephony systemsInternational Journal of Information Security10.1007/s10207-016-0338-916:5(491-523)Online publication date: 1-Oct-2017
  • (2017)On Communication Models When Verifying Equivalence PropertiesProceedings of the 6th International Conference on Principles of Security and Trust - Volume 1020410.1007/978-3-662-54455-6_7(141-163)Online publication date: 22-Apr-2017
  • (2016)Bounding the Number of Agents, forźEquivalence TooProceedings of the 5th International Conference on Principles of Security and Trust - Volume 963510.5555/3089491.3089505(211-232)Online publication date: 2-Apr-2016
  • (2016)Secure Mix-Zones for Privacy Protection of Road Network Location Based Services UsersJournal of Computer Networks and Communications10.1155/2016/38215932016Online publication date: 1-Apr-2016
  • (2016)Automated Verification of Equivalence Properties of Cryptographic ProtocolsACM Transactions on Computational Logic10.1145/292671517:4(1-32)Online publication date: 20-Sep-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media