On Backward-Style Verification for Timed Anonymity of Security Protocols

被引:0
|
作者
Kawabe, Yoshinobu [1 ]
Ito, Nobuhiro [1 ]
机构
[1] Aichi Inst Technol, Dept Informat Sci, 1247 Yachigusa Yakusa Cho, Toyota, Aichi, Japan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation. There are two sorts of anonymous simulation methods a forward-style method and a backward-style method. In our previous work, we discussed a proof technique for the anonymity of real-time systems, and the approach was based on the forward-style method. In this study, we concentrate on the backward-style method, and we discuss how to prove the timed anonymity.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [41] An IDE for the Design, Verification and Implementation of Security Protocols
    Garcia, Remi
    Modesti, Paolo
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2017), 2017, : 157 - 163
  • [42] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [43] Automated verification of selected equivalences for security protocols
    Blanchet, B
    Abadi, M
    Fournet, C
    LICS 2005: 20TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE - PROCEEDINGS, 2005, : 331 - 340
  • [44] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    Li, Xiaohong
    Thanh Tho Quan
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (01) : 57 - 75
  • [45] Integrated Specification and Verification of Security Protocols and Policies
    Frau, Simone
    Torabi-Dashti, Mohammad
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 18 - 32
  • [46] Security of DSA type batch verification protocols
    Li, Zichen
    Li, Zhongxian
    Yang, Yixian
    Chinese Journal of Electronics, 1999, 8 (02): : 175 - 177
  • [47] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [48] Improving Automatic Verification of Security Protocols with XOR
    Chen, Xihui
    van Deursen, Ton
    Pang, Jun
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 107 - 126
  • [49] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [50] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Jun Sun
    Yang Liu
    Jin Song Dong
    Xiaohong Li
    Thanh Tho Quan
    Frontiers of Computer Science, 2012, 6 : 57 - 75