Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provided by a protocol can be expressed in terms of the probability of error associated to the inference of the secret information.We consider a probabilistic process calculus approach to the specification of such protocols, and we study how the operators affect the probability of error. In particular, we characterize constructs that have the property of not decreasing the degree of protection, and that can therefore be considered safe in the modular construction of protocols.As a case study, we apply these techniques to the Dining Cryptographers, and we are able to deri...
Abstract. Anonymity is the property of maintaining secret the identity of users performing a certain...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
Abstract. Anonymity is the property of maintaining secret the identity of users performing a certain...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
Abstract. Protocols for information-hiding often use randomized primitives to obfuscate the link bet...
Protocols for information-hiding often use randomized primitives to obfuscate the link between the o...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceProtocols for information-hiding often use randomized primitives to obfuscate ...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
International audienceSystems concerned with information hiding often use randomization to obfuscate...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Abstract. We describe a probabilistic polynomial-time process calculus for analyzing cryptographic p...
Abstract. We prove properties of a process calculus that is designed for analysing security protocol...
Abstract. Anonymity is the property of maintaining secret the identity of users performing a certain...
AbstractWe describe properties of a process calculus that has been developed for the purpose of anal...
In this survey paper we consider the class of protocols for information-hiding which use randomizati...