Logging-independent Message Anonymity in the Relational Method

 

Title: Logging-independent Message Anonymity in the Relational Method
Author: Pasquale Noce (pasquale /dot/ noce /dot/ lavoro /at/ gmail /dot/ com)
Submission date: 2021-08-26
Abstract: In the context of formal cryptographic protocol verification, logging-independent message anonymity is the property for a given message to remain anonymous despite the attacker's capability of mapping messages of that sort to agents based on some intrinsic feature of such messages, rather than by logging the messages exchanged by legitimate agents as with logging-dependent message anonymity. This paper illustrates how logging-independent message anonymity can be formalized according to the relational method for formal protocol verification by considering a real-world protocol, namely the Restricted Identification one by the BSI. This sample model is used to verify that the pseudonymous identifiers output by user identification tokens remain anonymous under the expected conditions.
BibTeX:
@article{Logging_Independent_Anonymity-AFP,
  author  = {Pasquale Noce},
  title   = {Logging-independent Message Anonymity in the Relational Method},
  journal = {Archive of Formal Proofs},
  month   = aug,
  year    = 2021,
  note    = {\url{https://isa-afp.org/entries/Logging_Independent_Anonymity.html},
            Formal proof development},
  ISSN    = {2150-914x},
}
License: BSD License
Status: [ok] This is a development version of this entry. It might change over time and is not stable. Please refer to release versions for citations.