Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity
We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-
passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that …
passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that …
Compositional Analysis of Protocol Equivalence in the Applied -Calculus Using Quasi-open Bisimilarity
This paper shows that quasi-open bisimilarity is the coarsest bisimilarity congruence for the
applied π π-calculus. Furthermore, we show that this equivalence is suited to security and …
applied π π-calculus. Furthermore, we show that this equivalence is suited to security and …
When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus
We prove that three semantics for the applied π-calculus coincide–a testing semantics, a
labelled equivalence, and a modal logic–and explain how design decisions in each of these …
labelled equivalence, and a modal logic–and explain how design decisions in each of these …
Unlinkability of an improved key agreement protocol for EMV 2nd gen payments
To address known privacy problems with the EMV standard, EMVCo have proposed a
Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future …
Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future …
Provably unlinkable smart card-based payments
The most prevalent smart card-based payment method, EMV, currently offers no privacy to
its users. Transaction details and the card number are sent in cleartext, enabling the profiling …
its users. Transaction details and the card number are sent in cleartext, enabling the profiling …
[PDF][PDF] Epistemic Model Checking for Privacy
We define an epistemic logic or logic of knowledge, PL, and a formalism to undertake
privacy-centric reasoning in security protocols, over a Dolev-Yao model. We are able to …
privacy-centric reasoning in security protocols, over a Dolev-Yao model. We are able to …
A characterisation of open bisimilarity using an intuitionistic modal logic
Open bisimilarity is defined for open process terms in which free variables may appear. The
insight is, in order to characterise open bisimilarity, we move to the setting of intuitionistic …
insight is, in order to characterise open bisimilarity, we move to the setting of intuitionistic …
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π‐Calculus Extension Theory
F Wu, J Liu, Y Li, M Ni - IET Information Security, 2024 - Wiley Online Library
The π‐calculus is a basic theory of mobile communication based on the notion of interaction,
which, is aimed at analyzing and modeling the behaviors of communication processes in …
which, is aimed at analyzing and modeling the behaviors of communication processes in …
LpiCT: a logic security analysis framework for protocols
F Wu, J Liu, Y Li, M Ni - arxiv preprint arxiv:2312.02171, 2023 - arxiv.org
The pi calculus is a basic theory of mobile communication based on the notion of interaction,
which, aimed at analyzing and modelling the behaviors of communication process in …
which, aimed at analyzing and modelling the behaviors of communication process in …
[PDF][PDF] Diamonds for security: a non-interleaving operational semantics for the applied pi-calculus
We introduce a non-interleaving structural operational semantics for the applied π-calculus
and prove that it satisfies the properties expected of a labelled asynchronous transition …
and prove that it satisfies the properties expected of a labelled asynchronous transition …