Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity

I Filimonov, R Horne, S Mauw, Z Smith - … 23–27, 2019, Proceedings, Part I …, 2019 - Springer
We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-
passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that …

Compositional Analysis of Protocol Equivalence in the Applied -Calculus Using Quasi-open Bisimilarity

R Horne, S Mauw, S Yurkov - International Colloquium on Theoretical …, 2021 - Springer
This paper shows that quasi-open bisimilarity is the coarsest bisimilarity congruence for the
applied π π-calculus. Furthermore, we show that this equivalence is suited to security and …

When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus

R Horne, S Mauw, S Yurkov - Theoretical Computer Science, 2023 - Elsevier
We prove that three semantics for the applied π-calculus coincide–a testing semantics, a
labelled equivalence, and a modal logic–and explain how design decisions in each of these …

Unlinkability of an improved key agreement protocol for EMV 2nd gen payments

R Horne, S Mauw, S Yurkov - 2022 IEEE 35th Computer …, 2022 - ieeexplore.ieee.org
To address known privacy problems with the EMV standard, EMVCo have proposed a
Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future …

Provably unlinkable smart card-based payments

S Bursuc, R Horne, S Mauw, S Yurkov - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The most prevalent smart card-based payment method, EMV, currently offers no privacy to
its users. Transaction details and the card number are sent in cleartext, enabling the profiling …

[PDF][PDF] Epistemic Model Checking for Privacy

F Rajaona, I Boureanu, R Ramanujam… - 2024 IEEE 37th …, 2024 - people.itcarlson.com
We define an epistemic logic or logic of knowledge, PL, and a formalism to undertake
privacy-centric reasoning in security protocols, over a Dolev-Yao model. We are able to …

A characterisation of open bisimilarity using an intuitionistic modal logic

KY Ahn, R Horne, A Tiu - Logical Methods in Computer …, 2021 - lmcs.episciences.org
Open bisimilarity is defined for open process terms in which free variables may appear. The
insight is, in order to characterise open bisimilarity, we move to the setting of intuitionistic …

LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π‐Calculus Extension Theory

F Wu, J Liu, Y Li, M Ni - IET Information Security, 2024 - Wiley Online Library
The π‐calculus is a basic theory of mobile communication based on the notion of interaction,
which, is aimed at analyzing and modeling the behaviors of communication processes in …

LpiCT: a logic security analysis framework for protocols

F Wu, J Liu, Y Li, M Ni - arxiv preprint arxiv:2312.02171, 2023 - arxiv.org
The pi calculus is a basic theory of mobile communication based on the notion of interaction,
which, aimed at analyzing and modelling the behaviors of communication process in …

[PDF][PDF] Diamonds for security: a non-interleaving operational semantics for the applied pi-calculus

C Aubert, R Horne, C Johansen - 2022 - ntnuopen.ntnu.no
We introduce a non-interleaving structural operational semantics for the applied π-calculus
and prove that it satisfies the properties expected of a labelled asynchronous transition …