期刊文献+

概率Applied Pi框架下的匿名度分析

Measuring anonymous system with probabilistic Applied Pi calculus
下载PDF
导出
摘要 在概率Applied Pi下对安全协议的匿名度进行研究:它在概率Applied Pi进程上定义了metric,以对进程间的相似进行度量;该定义被证明是有效的,因为当两个进程之间的metric为0时这两个进程弱互模拟;基于metric给出了匿名度的形式化定义。最后分析了密码学家就餐问题,用概率Applied Pi对其建模,计算匿名度。 This paper studied the anonymity in the model of probabilistic Applied Pi ( PAPi ). First, defined a metric on PAPi processes to measure the similarity between processes. This metric was then shown to be well-defined since it turns out to be 0 when two processes are weakly bisimilar. Upon metric, gave the formal definition of anonymity degree. Finally, as an illustrating example, analyzed the anonymity of probabilistic dining cryptographer problem (DCP) in framework.
出处 《计算机应用研究》 CSCD 北大核心 2009年第8期3000-3003,共4页 Application Research of Computers
基金 国家"973"计划资助项目(2003CB317005) 国家自然科学基金资助项目(60573002 60703033) 浙江省科技计划资助项目(2007C31009)
关键词 概率进程演算 匿名度 互模拟 匿名协议 密码学家就餐问题 probabilistic process calculus degree of anonymity bisimalation anonymous system DCP
  • 相关文献

参考文献2

二级参考文献19

  • 1顾永跟,傅育熙,朱涵.基于可达关系的安全协议保密性分析[J].计算机学报,2007,30(2):255-261. 被引量:4
  • 2R Milner,J Parrow,et al.A Calculus of Mobile Processes,Parts I and II[J].Information and Computation,1992,1-40,41-77.
  • 3M Abadi,C Fournet.Mobile Values,New Names and Secure Communication[C].The 28th ACM Symposium on Principles of Programming Languages(POPL'01),2001.104-115.
  • 4M Abadi,B Blanchet.Computer-assisted Verification of a Protocol for Certified Email[C].Static Anlaysis,the 10th International Symposium(SAS'03),LNCS 2694,Springer-Verlag,2003.316-335.
  • 5M Abadi,B Blanchet,C Fournet.Just Fast Keying in the pi Calculus[C].The 13th European Symposium on Programming,LNCS 2986,Springer-Verlag,2004.340-354.
  • 6M Abadi,C Fournet.Hiding Names:Private Authentication in the Applied pi Calculus[C].The Proceedings of the International Symposium on Software Security (ISSS'02),LNCS 2609,Springer-Verlag,2003.317-338.
  • 7M Bellare,et al.iKP:A Family of Secure Electronic Payment Protocols[C].USENIX,1995.
  • 8M Bellare,J Garay,R Hauser,et al.Design,Implementation,and Deployment of the iKP Secure Electronic Payment System[J].IEEE Journal of Selected Areas in Communications,2000,18:611-627.
  • 9T Y C Woo,S S Lam.A Semantic Model for Authentication Protocols[C].The 14th IEEE Symposium on Research in Security and Privacy,IEEE Computer Society Press,1993.178-194.
  • 10Halpern J Y. Anonymity and information hiding in multiagent systems[J]. Journal of Computer Security, 2005, 13(3): 75-88.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部