Abstract. A predicate is opaque for a given system, if an adversary will never be able to establish truth or falsehood of the predicate for any observed computation. This notion has been essentially introduced and studied in the context of transition systems whether describing the semantics of programs, security protocols or other systems. In this paper, we are interested in studying opacity in the probabilistic computational world. Indeed, in other settings, as in the Dolev-Yao model for instance, even if an adversary is 99 % sure of the truth of the predicate, it remains opaque as the adversary cannot conclude for sure. In this paper, we introduce a computational version of opacity in the case of passive adversaries called cryptographic o...
Security is one of the most important properties of systems such as Internet of things, communicatio...
Abstract. We present a novel equivalence for cryptographic expressions that overcomes two limitation...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...
International audienceOpacity is a general language-theoretic framework in which several security pr...
A system is said to be current-state opaque if the entrance of the system state to a set of secret s...
International audienceThe opacity property characterizes the absence of confidential information flo...
Opacity is a generic security property, that has been defined on (non-probabilistic) transition syst...
International audienceA system satisfies opacity if its secret behaviors cannot be detected by any u...
Motivated by security considerations in applications of discrete event systems, we describe and anal...
International audienceIn discrete-event systems, the opacity of a secret ensures that some behaviors...
the date of receipt and acceptance should be inserted later Abstract Opacity is a security property ...
This paper considers state-based opacity in a setting where attackers of a secret have additional ob...
Motivated by security and privacy considerations in applications of discrete event systems, we descr...
Given a finite transition system and a regular predicate, we address the problem of computing a cont...
Abstract—Motivated by security and privacy consid-erations in a variety of applications of discrete ...
Security is one of the most important properties of systems such as Internet of things, communicatio...
Abstract. We present a novel equivalence for cryptographic expressions that overcomes two limitation...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...
International audienceOpacity is a general language-theoretic framework in which several security pr...
A system is said to be current-state opaque if the entrance of the system state to a set of secret s...
International audienceThe opacity property characterizes the absence of confidential information flo...
Opacity is a generic security property, that has been defined on (non-probabilistic) transition syst...
International audienceA system satisfies opacity if its secret behaviors cannot be detected by any u...
Motivated by security considerations in applications of discrete event systems, we describe and anal...
International audienceIn discrete-event systems, the opacity of a secret ensures that some behaviors...
the date of receipt and acceptance should be inserted later Abstract Opacity is a security property ...
This paper considers state-based opacity in a setting where attackers of a secret have additional ob...
Motivated by security and privacy considerations in applications of discrete event systems, we descr...
Given a finite transition system and a regular predicate, we address the problem of computing a cont...
Abstract—Motivated by security and privacy consid-erations in a variety of applications of discrete ...
Security is one of the most important properties of systems such as Internet of things, communicatio...
Abstract. We present a novel equivalence for cryptographic expressions that overcomes two limitation...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...