The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Forward and backward simulations I.: untimed systems
Information and Computation
Modeling and verification of randomized distributed real-time systems
Modeling and verification of randomized distributed real-time systems
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Secure information flow in a multi-threaded imperative language
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Probabilistic noninterference in a concurrent language
Journal of Computer Security
Probabilistic simulations for probabilistic processes
Nordic Journal of Computing
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
The Linear Time-Branching Time Spectrum (Extended Abstract)
CONCUR '90 Proceedings of the Theories of Concurrency: Unification and Extension
Probabilistic Noninterference for Multi-Threaded Programs
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
A randomized encoding of the π-calculus with mixed choice
Theoretical Computer Science - Process algebra
CONCUR 2005 - Concurrency Theory
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Distributing probability over non-determinism
Mathematical Structures in Computer Science
Anonymity and information hiding in multiagent systems
Journal of Computer Security
Theoretical Computer Science - Automated reasoning for security protocol analysis
Probability of Error in Information-Hiding Protocols
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
Theorem-proving anonymity of infinite-state systems
Information Processing Letters
Probabilistic analysis of an anonymity system
Journal of Computer Security - Special issue on CSFW15
Information hiding, anonymity and privacy: a modular approach
Journal of Computer Security - Special issue on WITS'02
RETRACTED: Semantic Domains for Combining Probability and Non-Determinism
Electronic Notes in Theoretical Computer Science (ENTCS)
Probabilistic and Nondeterministic Aspects of Anonymity
Electronic Notes in Theoretical Computer Science (ENTCS)
Probabilistic anonymity via coalgebraic simulations
ESOP'07 Proceedings of the 16th European conference on Programming
Analysing the MUTE anonymous file-sharing system using the pi-calculus
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Context-free languages via coalgebraic trace semantics
CALCO'05 Proceedings of the First international conference on Algebra and Coalgebra in Computer Science
Generic forward and backward simulations
CONCUR'06 Proceedings of the 17th international conference on Concurrency Theory
Making random choices invisible to the scheduler
CONCUR'07 Proceedings of the 18th international conference on Concurrency Theory
Generic forward and backward simulations II: probabilistic simulation
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
Hi-index | 5.23 |
There is a growing concern about anonymity and privacy on the Internet, resulting in lots of work on formalization and verification of anonymity. In particular, the importance of probabilistic aspects of anonymity has recently been highlighted by many authors. Several different notions of ''probabilistic anonymity'' have been studied so far, but proof methods for such probabilistic notions have not yet been elaborated. In this paper we introduce a simulation-based proof method for one notion of probabilistic anonymity introduced by Bhargava and Palamidessi, called strong probabilistic anonymity. The method is a probabilistic adaptation of the one by Kawabe, Sakurada et al. for non-deterministic anonymity; anonymity of a protocol is proved by finding a forward/backward simulation between certain automata. For the jump from non-determinism to probability we exploit a generic, coalgebraic theory of traces and simulations developed by Hasuo, Jacobs and Sokolova. In particular, an appropriate notion of probabilistic simulation is obtained as an instantiation of the generic definition, for which soundness theorem comes for free. Additionally, we show how we can use a similar idea to verify a weaker notion of probabilistic anonymity called probable innocence.