A Bisimilarity Congruence for the Applied pi-Calculus Sufficiently Coarse to Verify Privacy Properties

11/06/2018
by   Ross Horne, et al.
0

This paper is the first thorough investigation into the coarsest notion of bisimilarity for the applied pi-calculus that is a congruence relation: open barbed bisimilarity. An open variant of labelled bisimilarity (quasi-open bisimilarity), better suited to constructing bisimulations, is proven to coincide with open barbed bisimilarity. These bisimilary congruences are shown to be characterised by an intuitionistic modal logic that can be used, for example, to describe an attack on privacy whenever a privacy property is violated. Open barbed bisimilarity provides a compositional approach to verifying cryptographic protocols, since properties proven can be reused in any context, including under input prefix. Furthermore, open barbed bisimilarity is sufficiently coarse for reasoning about security and privacy properties of cryptographic protocols; in constrast to the finer bisimilarity congruence, open bisimilarity, which cannot verify certain privacy properties.

READ FULL TEXT
research
11/06/2022

DeepSec: Deciding Equivalence Properties for Security Protocols – Improved theory and practice

Automated verification has become an essential part in the security eval...
research
02/26/2018

The Finite Model Property of Quasi-transitive Modal Logic

The finite model property of the quasi-transitive modal logic K_2^3=K⊕ p...
research
12/19/2020

Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous Cryptocurrencies

In blockchain-based anonymous cryptocurrencies, due to their tamper-resi...
research
01/16/2018

Refining Properties of Filter Models: Sensibility, Approximability and Reducibility

In this paper, we study the tedious link between the properties of sensi...
research
07/05/2018

FocusST Solution for Analysis of Cryptographic Properties

To analyse cryptographic properties of distributed systems in a systemat...
research
09/06/2022

Bisimulations Respecting Duration and Causality for the Non-interleaving Applied π-Calculus

This paper shows how we can make use of an asynchronous transition syste...
research
02/18/2020

Discovering ePassport Vulnerabilities using Bisimilarity

We uncover privacy vulnerabilities in the ICAO 9303 standard implemented...

Please sign up or login with your details

Forgot password? Click here to reset