International audienceFormal methods have proved their usefulness for analyzing the security of protocols. Most existing results focus on trace properties like secrecy (expressed as a reachability property) or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require the notion of observational equivalence. Typical examples are anonymity, privacy related properties or statements closer to security properties used in cryptography. In this paper, we consider the applied pi calculus and we show that for determinate processes, observational equivalence actually coincides with trace equivalence, a notion simpler to reason with. We exhibit a large class ...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
International audienceFormal methods have proved effective to automatically analyse protocols. Recen...
International audienceObservational equivalence allows us to study important security properties suc...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
Formal methods have proved their usefulness for analyzing the security of protocols. Most existing r...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
Abstract. Indistinguishability properties are essential in formal verifi-cation of cryptographic pro...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
. We use properties of observational equivalence for a probabilistic process calculus to prove an au...
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have...
International audienceDeciding privacy-type properties of deterministic cryptographic protocols such...
AbstractIn the analysis of security protocols, methods and tools for reasoning about protocol behavi...
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have...
This paper presents an extension of the automatic protocol verifier ProVerif in order to prove more ...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
International audienceFormal methods have proved effective to automatically analyse protocols. Recen...
International audienceObservational equivalence allows us to study important security properties suc...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
Formal methods have proved their usefulness for analyzing the security of protocols. Most existing r...
We consider security properties of cryptographic protocols that can be modeled using the notion of t...
Abstract. Indistinguishability properties are essential in formal verifi-cation of cryptographic pro...
Indistinguishability properties are essential in formal verification of cryptographic protocols. The...
. We use properties of observational equivalence for a probabilistic process calculus to prove an au...
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have...
International audienceDeciding privacy-type properties of deterministic cryptographic protocols such...
AbstractIn the analysis of security protocols, methods and tools for reasoning about protocol behavi...
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have...
This paper presents an extension of the automatic protocol verifier ProVerif in order to prove more ...
International audiencePrivacy properties such as untraceability, vote secrecy, or anonymity are typi...
International audienceFormal methods have proved effective to automatically analyse protocols. Recen...
International audienceObservational equivalence allows us to study important security properties suc...