Automatic verification of privacy properties in the applied pi calculus

N/ACitations
Citations of this article
21Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We develop a formal method verification technique for cryptographic protocols. We focus on proving observational equivalences of the kind P ∼ Q, where the processes P and Q have the same structure and differ only in the choice of terms. The calculus of ProVerif, a variant of the applied pi calculus, makes some progress in this direction. We expand the scope of ProVerif, to provide reasoning about further equivalences. We also provide an extension which allows modelling of protocols which require global synchronisation. Finally we develop an algorithm to enable automated reasoning. We demonstrate the practicality of our work with two case studies. © 2008 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Delaune, S., Ryan, M., & Smyth, B. (2008). Automatic verification of privacy properties in the applied pi calculus. In IFIP International Federation for Information Processing (Vol. 263, pp. 263–278). https://doi.org/10.1007/978-0-387-09428-1_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free