# Hide and New in the Pi-Calculus

@inproceedings{Giunti2012HideAN, title={Hide and New in the Pi-Calculus}, author={Marco Giunti and Catuscia Palamidessi and Frank D. Valencia}, booktitle={Combined International Workshop Expressiveness Concurrency and Workshop Structural Operational Semantics}, year={2012} }

In this paper, we enrich the pi-calculus with an operator for confidentiality (hide), whose main effect is to restrict the access to the object of the communication, thus representing confidentiality in a natural way. The hide operator is meant for local communication, and it differs from new in that it forbids the extrusion of the name and hence has a static scope. Consequently, a communication channel in the scope of a hide can be implemented as a dedicated channel, and it is more secure than…

## 17 Citations

### The Cπ-calculus: a Model for Confidential Name Passing

- Computer ScienceICE
- 2019

This paper presents a formal model in which dissemination of information is disabled at the level of the syntax in a direct way, and introduces a subcalculus of the pi-calculus in which channels are considered as confidential information.

### Static Semantics of Secret Channel Abstractions

- Computer ScienceNordSec
- 2014

The secret π-calculus extends the π-calculus by adding an hide operator that permits to declare channels as secret. The main aim is confidentiality, which is gained by restricting the access of the…

### Algorithmic type checking for a pi-calculus with name matching and session types

- Computer ScienceJ. Log. Algebraic Methods Program.
- 2013

### GoPi: Compiling Linear and Static Channels in Go

- Computer ScienceCOORDINATION
- 2020

It is argued that GoPi can support academic activities involving process algebras and formal models, which range from the analysis and testing of concurrent processes for research purposes to teaching formal languages and concurrent systems.

### A Calculus for Modeling Floating Authorizations

- Computer ScienceFORTE
- 2018

This paper presents the operational semantics of the model in two equivalent alternative ways, each informing on the specific nature of authorizations, and introduces a typing discipline to single out systems that never get stuck due to lacking authorizations.

### Denotational semantics of channel mobility in UTP-CSP

- Computer ScienceFormal Aspects Comput.
- 2021

The denotational semantics for channel mobility in the Unifying Theories of Programming (UTP) semantics framework is presented and the first semantics for the renaming and hiding operators in the context of channel mobility is provided.

### Denotational semantics of channel mobility in UTP-CSP

- Computer ScienceFormal Aspects of Computing
- 2021

The denotational semantics for channel mobility in the Unifying Theories of Programming (UTP) semantics framework is presented and the first semantics for the renaming and hiding operators in the context of channel mobility is provided.

### Availability by Design:A Complementary Approach to Denial-of-Service

- Computer Science
- 2015

This work focuses on SMT formulae where the theories in question are first-order logic and the theory of Equality with Uninterpreted Functions (EUF), also known as the empty theory or the free theory, as it contains no equation other than those implied by equality being an equivalence relation and by the definition of function.

### A Typed Model for Dynamic Authorizations

- Computer SciencePLACES
- 2015

This work builds upon the pi-calculus so as to enrich communication-based systems with authorization specification and delegation; here authorizations regard channel usage and delegation refers to the act of yielding an authorization to another party.

### Formal Aspects of Computing Dynamic role authorization in multiparty conversations

- Computer Science
- 2016

A typed framework for the analysis of multiparty interaction with dynamic role authorization and delegation and introduces a typing discipline that ensures that processes never reduce to authorization errors, including when parties dynamically acquire authorizations.

## References

SHOWING 1-10 OF 26 REFERENCES

### Hide and New in the π -calculus

- Computer Science
- 2012

The hide operator is meant for local communication, and it differs from new in that it forbids the extrusion of the name and hence has a static scope, so a communication channel in the scope of a hide can be implemented as a dedicated channel and it is more secure than one in thescope of a new .

### Just fast keying in the pi calculus

- Computer ScienceTSEC
- 2007

This paper formally analyzes JFK's core security properties and also other properties that are rarely articulated and rigorously studied, such as plausible deniability and resistance to denial-of-service attacks in the applied pi calculus.

### Secure implementations of typed channel abstractions

- Computer Science, MathematicsPOPL '07
- 2007

This paper develops a secure implementation of a typed pi calculus, in which capability types are employed to realize the policies for the access to communication channels, and preserves the forward secrecy of communications in a calculus that includes matching and supports the dynamic exchange of write and read access-rights among processes.

### Proof techniques for cryptographic processes

- Computer Science, MathematicsProceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158)
- 1999

An 'environment-sensitive' labelled transition system is developed, where transitions are constrained by the knowledge the environment has of names and keys, and a trace equivalence and a co-inductive weak bisimulation equivalence are defined, both of which avoid quantification over contexts.

### Secure implementation of channel abstractions

- Computer Science, MathematicsProceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.98CB36226)
- 1998

A simple high-level language is introduced that includes constructs for creating and using secure channels and a correctness theorem is obtained that implies that one can reason about programs in the high- level language without mentioning the subtle cryptographic protocols used in their lower-level implementation.

### Mobile values, new names, and secure communication

- Computer SciencePOPL '01
- 2001

A simple, general extension of the pi calculus with value passing, primitive functions, and equations among terms is introduced, and semantics and proof techniques for this extended language are developed and applied in reasoning about some security protocols.

### Secrecy and Group Creation

- Computer ScienceCONCUR
- 2000

This work adds an operation of group creation to the typed @p-calculus, where a group is a type for channels, and formalizes intuition by adapting a notion of secrecy introduced by Abadi, and proving a preservation of secrecy property.

### Bisimulation in name-passing calculi without matching

- Computer ScienceProceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.98CB36226)
- 1998

A coinductive characterisation of typed barbed equivalence is given, and "bisimulation up-to" techniques are presented to enhance the resultingCoinductive proof method for process equalities that fail in the ordinary /spl pi/-calculus.

### A calculus for cryptographic protocols: the spi calculus

- Computer Science, MathematicsCCS '97
- 1997

The spi calculus is introduced, an extension of the pi calculus designed for describing and analyzing cryptographic protocols and state their security properties in terms of coarse-grained notions of protocol equivalence.