Privacy as Reachability

Sébastien Gondron*, Sebastian Mödersheim, Luca Viganò

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

We show that privacy can be formalized as a reachability problem. We introduce a transaction-process formalism for distributed systems that can exchange cryptographic messages (in a black-box cryptography model). Our formalism includes privacy variables chosen non-deterministically from finite domains (e.g., candidates in a voting protocol), it can work with long-term mutable states (e.g., a hash-key chain) and allows one to specify consciously released information (e.g., number of votes and the result). We discuss examples, e.g., problems of linkability, and the core of the privacy-preserving proximity tracing system DP-3T.
Original languageEnglish
Title of host publicationProceedings of the 2022 IEEE 35th Computer Security Foundations Symposium (CSF)
PublisherIEEE
Publication date2022
Pages130-146
ISBN (Print)978-1-6654-8418-3
ISBN (Electronic)978-1-6654-8417-6
DOIs
Publication statusPublished - 2022
Event2022 IEEE 35th Computer Security Foundations Symposium - Haifa, Israel
Duration: 7 Aug 202210 Aug 2022
Conference number: 35

Conference

Conference2022 IEEE 35th Computer Security Foundations Symposium
Number35
Country/TerritoryIsrael
CityHaifa
Period07/08/202210/08/2022

Keywords

  • Formal Methods
  • Protocol security
  • Transition system
  • Linkability
  • DP-3T

Fingerprint

Dive into the research topics of 'Privacy as Reachability'. Together they form a unique fingerprint.

Cite this