Provable anonymity

  title={Provable anonymity},
  author={Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum},
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic.The key ingredient is our notion of observational equivalence, which is based on the cryptographic structure of messages and relations between otherwise random looking messages. Two runs are considered observationally equivalent if a spy cannot discover any meaningful distinction between them.We illustrate our approach by proving sender… CONTINUE READING
Highly Cited
This paper has 42 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 29 extracted citations

Formal Techniques for Safety-Critical Systems

Communications in Computer and Information Science • 2013
View 10 Excerpts
Highly Influenced

Untraceability of RFID Protocols

View 3 Excerpts
Highly Influenced

Group Anonymity in Security Protocols

2018 Federated Conference on Computer Science and Information Systems (FedCSIS) • 2018
View 3 Excerpts

Knowledge and Security

ArXiv • 2013
View 1 Excerpt

An Inductive Approach to Provable Anonymity

2011 Sixth International Conference on Availability, Reliability and Security • 2011
View 2 Excerpts

Bulletin Boards in Voting Systems: Modelling and Measuring Privacy

2011 Sixth International Conference on Availability, Reliability and Security • 2011
View 1 Excerpt


Publications referenced by this paper.
Showing 1-4 of 4 references

Crowds: Anonymity for Web Transactions

ACM Trans. Inf. Syst. Secur. • 1998
View 14 Excerpts
Highly Influenced

Hiding Routing Information

View 19 Excerpts
Highly Influenced

Tor: The Second-Generation Onion Router

USENIX Security Symposium • 2004
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…