The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
From LCF to HOL: a short history
Proof, language, and interaction
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
A lattice model of secure information flow
Communications of the ACM
Hordes: a multicast based protocol for anonymity
Journal of Computer Security
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Crowds: Anonymity for Web Transactions
Crowds: Anonymity for Web Transactions
Quantitative Information Flow, Relations and Polymorphic Types
Journal of Logic and Computation
CONCUR 2005 - Concurrency Theory
A Computationally Sound Mechanized Prover for Security Protocols
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Assessing security threats of looping constructs
Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Electronic Notes in Theoretical Computer Science (ENTCS)
Probabilistic analysis of an anonymity system
Journal of Computer Security - Special issue on CSFW15
Verification of expectation properties for discrete random variables in HOL
TPHOLs'07 Proceedings of the 20th international conference on Theorem proving in higher order logics
Sums and Lovers: Case Studies in Security, Compositionality and Refinement
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Quantitative analysis of information flow using theorem proving
ICFEM'12 Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering
Probabilistic Relational Reasoning for Differential Privacy
ACM Transactions on Programming Languages and Systems (TOPLAS)
Hi-index | 0.00 |
Below we present an information-theoretic method for proving the amount of information leaked by programs formalized using the HOL4 theorem-prover. The advantages of this approach are that the analysis is quantitative, and therefore capable of expressing partial leakage, and that proofs are performed using the HOL4 theorem-prover, and are therefore guaranteed to be logically and mathematically consistent with the formalization. The applicability of this methodology to proving privacy properties of Privacy Enhancing Technologies is demonstrated by proving the anonymity of the Dining Cryptographers protocol. To the best of the author's knowledge, this is the first machine-verified proof of privacy of the Dining Cryptographers protocol for an unbounded number of participants and a quantitative metric for privacy.