Formal Analysis of Anonymity Based on Strand Space Model

被引:0
|
作者
Zhang, Lu [1 ]
Luo, Junzhou [1 ]
机构
[1] Southeast Univ, Sch Engn & Comp Sci, Nanjing, Peoples R China
关键词
Strand Space Model; equivalent bundles; extremum pair; Anonymity; Formal Methods; Ubiquitous Computing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous communication protocols can be used in ubiquitous environments to preserve the identity of users. To verify the correctness of the protocol, a formal framework for the analysis of anonymity property of anonymous communication protocols in terms of strand space model was proposed. The key ingredient is the notions of equivalent bundles and extremum pair, which are used to define anonymity. Then we illustrate our approach by proving sender anonymity and unlinkability for two well-known anonymous communication protocols, Crowds and Onion Routing and show how the framework is capable of verifying the correctness of protocols or capturing the flaws. The result shows that sender anonymity will fail in Crowds if there exist a global attacker and relation anonymity will fail in Onion Routing if the attacker knows the onion router's private key. Furthermore, to analyze the particular version of Onion Routing proposed in [1], it can also find the flaw in the protocol.
引用
收藏
页码:75 / 81
页数:7
相关论文
共 50 条
  • [31] Formal concept analysis based user model for distributed systems
    Khedija Arour
    Taoufik Yeferny
    [J]. Multimedia Tools and Applications, 2017, 76 : 16085 - 16105
  • [32] Online rule fusion model based on formal concept analysis
    Xiaohe Zhang
    Degang Chen
    Jusheng Mi
    [J]. International Journal of Machine Learning and Cybernetics, 2023, 14 : 2483 - 2497
  • [33] Formal analysis of model transformations based on triple graph grammars
    Hermann, Frank
    Ehrig, Hartmut
    Golas, Ulrike
    Orejas, Fernando
    [J]. MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2014, 24 (04)
  • [34] Application of Formal Concept Analysis in Model-Based Testing
    Ng, Pin
    Fung, Richard Y. K.
    [J]. ADVANCES IN SOFTWARE ENGINEERING, 2009, 30 : 110 - +
  • [35] Formal concept analysis based user model for distributed systems
    Arour, Khedija
    Yeferny, Taoufik
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16085 - 16105
  • [36] Dynamic Policy Access Model Based on Formal Concept Analysis
    Jiao, Suyun
    Liu, Yanheng
    Hu, Haiyan
    Wei, Da
    Zhang, Yanzhi
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 5077 - 5081
  • [37] A formal analysis method for composition protocol based on model checking
    Meihua Xiao
    Hanyu Zhao
    Ke Yang
    Ri Ouyang
    Weiwei Song
    [J]. Scientific Reports, 12
  • [38] Formal Analysis of Authentication Protocol Based on Directed Graph Model
    Li, Changchun
    Wang, Kangnian
    Zhu, Xingtao
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 829 - 835
  • [39] Formal Model and Analysis of Sliding Window Protocol Based on NuSMV
    Zhao, Yefei
    Yang Zong-yuan
    Xie, Jinkui
    Liu, Qiang
    [J]. JOURNAL OF COMPUTERS, 2009, 4 (06) : 519 - 526
  • [40] A formal analysis of coercion-resistance of the Internet voting protocol based on DKR formal model
    Meng, Bo
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 490 - 494