ACM Transactions on Computer Systems (TOCS)
Reasoning about knowledge
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Practical Secret Voting Scheme for Large Scale Elections
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Group Principals and the Formalization of Anonymity
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Symbolic Model Checking the Knowledge of the Dining Cryptographers
CSFW '04 Proceedings of the 17th IEEE workshop on Computer Security Foundations
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Anonymity and information hiding in multiagent systems
Journal of Computer Security
Coercion-Resistance and Receipt-Freeness in Electronic Voting
CSFW '06 Proceedings of the 19th IEEE workshop on Computer Security Foundations
Data Anonymity in the FOO Voting Scheme
Electronic Notes in Theoretical Computer Science (ENTCS)
Epistemic Verification of Anonymity
Electronic Notes in Theoretical Computer Science (ENTCS)
Theorem-proving anonymity of infinite-state systems
Information Processing Letters
Information hiding, anonymity and privacy: a modular approach
Journal of Computer Security - Special issue on WITS'02
Knowledge-based modelling of voting protocols
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Preservation of epistemic properties in security protocol implementations
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Communications of the ACM - Organic user interfaces
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
An Indistinguishability-Based Characterization of Anonymous Channels
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
On Backward-Style Anonymity Verification
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Epistemic Logic for the Applied Pi Calculus
FMOODS '09/FORTE '09 Proceedings of the Joint 11th IFIP WG 6.1 International Conference FMOODS '09 and 29th IFIP WG 6.1 International Conference FORTE '09 on Formal Techniques for Distributed Systems
Verifying privacy-type properties of electronic voting protocols
Journal of Computer Security
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
A taxonomy for and analysis of anonymous communications networks
A taxonomy for and analysis of anonymous communications networks
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Probabilistic anonymity via coalgebraic simulations
ESOP'07 Proceedings of the 16th European conference on Programming
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Role Interchange for Anonymity and Privacy of Voting
Journal of Logic and Computation
A fair non-repudiation protocol
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Analysis of an electronic voting protocol in the applied pi calculus
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Hi-index | 0.01 |
In this paper, we propose a taxonomy of privacy-related information-hiding/disclosure properties in terms of the modal logic of knowledge for multiagent systems. The properties considered here are anonymity, privacy, onymity, and identity. Intuitively, anonymity means the property of hiding who performed a certain specific action, privacy involves hiding what was performed by a certain specific agent, onymity refers to disclosing who performed a certain specific action, and identity relates to disclosing what was performed by a certain specific agent. Building on Halpern and O'Neill's work, we provide formal definitions of these properties and study the logical structure underlying them. In particular, we show that some weak forms of anonymity and privacy are compatible with some weak forms of onymity and identity, respectively. We also discuss the relationships between our definitions and existing standard terminology, in particular Pfitzmann and Hansen's consolidated proposal.